iDev Soluções

Security Policy for App and Integration Development

Version: 1.0
Date: 2026-03-02
Applies to: All employees, contractors, and third parties who design, build, maintain, or operate apps, scripts, automations, and integrations for any customer.

1. Purpose

This policy defines iDev Soluções’ minimum security controls for producing and operating software that integrates with third-party platforms and customer environments. It is designed to protect confidentiality, integrity, and availability of customer data and iDev assets while keeping the policy practical for a small team.

2. Scope

This policy applies to:

3. Security Principles

4. Roles and Responsibilities

Policy Owner (Security Owner)

App Owner (per app or integration)

Developers and Implementers

Operations and Support (when applicable)

5. Baseline Controls for Endpoints and Accounts

5.1 Endpoint security

5.2 Identity and access management

6. Source Control and CI/CD Security (GitHub)

7. Dependency and Vulnerability Scanning (npm and Marketplace context)

8. Secure Development Lifecycle (Practical Secure SDLC)

8.1 Design and change planning

For every new feature or integration:

8.2 Implementation requirements

8.3 Web and transport security (when there is any external web component)

9. Secrets Management

10. Customer Data Protection and Minimization

11. Forge and Shared Responsibility

12. Logging and Monitoring

13. Vulnerability Management and Fix Timelines

13.1 Intake

Security issues may be discovered through:

13.2 Triage and remediation timelines

iDev targets the following maximum timeframes for cloud app vulnerabilities after report or triage:

13.3 Tracking and evidence

Each security issue must have:

14. Incident Response

An incident includes suspected or confirmed:

Minimum steps:

  1. Contain: revoke or rotate affected secrets and restrict access.
  2. Assess: determine impact, scope, and affected customers.
  3. Eradicate: fix root cause, patch systems, remove malicious access.
  4. Recover: validate services and controls, restore safe operations.
  5. Learn: document timeline, lessons learned, and preventive actions.

15. Privacy, Retention, and Deletion

16. Third-Party Services

17. Exceptions

18. Review and Updates

Appendix A: Release Security Checklist (one-page)

Before any production release:

Appendix B: Evidence Available Upon Request