Skip to content

Secure Development Practices Policy


Secure Development Practices Policy

Document Owner: Pobl Tech Limited (T/A Pobl)

Overview

This policy defines how security is embedded throughout the design, development, testing, deployment, and maintenance of all digital systems and services delivered by Pobl.

Its purpose is to ensure that systems are built and maintained in a way that protects data, reduces risk, and prevents vulnerabilities arising from development activity.

Security is treated as a core requirement at every stage of delivery.

Scope

This policy applies to all development and technical configuration work undertaken by Pobl, including:

Website and application development
Content management systems
Form handling and data processing
API development and integrations
Configuration changes and updates
Maintenance, enhancements, and defect resolution

It applies across all environments, including development, testing, staging, and production.

Our approach

We ensure that security is considered and applied throughout the full development lifecycle.

This includes:

Designing systems with security in mind from the outset
Following established coding standards and best practice
Applying controlled deployment and release processes
Maintaining systems securely over time

Security is not treated as an add-on. It is built into how systems are designed and delivered.

Secure design principles

Security requirements are identified during the planning and design stages of all work.

This includes consideration of:

Data sensitivity and classification
Authentication and authorisation requirements
Data flows between systems and services
Potential threats, misuse scenarios, and failure points

Design decisions take these factors into account, with appropriate safeguards applied.

Development standards and controls

All development work follows internal standards and recognised good practice.

This includes:

Avoiding hard-coded credentials, secrets, or keys
Validating and sanitising all user input
Protecting against common web application vulnerabilities
Using supported and maintained frameworks and libraries

Third-party components, plugins, and dependencies are reviewed before use and monitored for updates and security issues.

Environment management

Development, testing, and production environments are kept separate.

Live environments are not used for development or testing
Access to production systems is restricted to authorised personnel
Access is granted only where required for operational purposes

Testing and assurance

All changes are tested before deployment to ensure:

Intended functionality works as expected
Existing functionality is not affected
Security controls remain effective

Testing is proportionate to the nature of the change and may include functional, regression, and security-focused testing.

Deployment and release management

Deployments follow a controlled and documented process aligned with our Change Management Process.

This includes:

Review and approval of changes before release
Defined deployment procedures
Rollback plans to allow recovery if needed

Emergency changes are recorded and reviewed after implementation.

Patch and dependency management

Frameworks, platforms, plugins, and libraries are monitored for updates and security advisories.

Security patches are applied in a timely manner
Updates are tested before release
Changes follow established control processes

Logging and monitoring

Where appropriate, systems record logs relating to:

Errors
Access events
Key system activity

Logs are protected and used to support monitoring, investigation, and incident response.

Responsibilities

Developers

Responsible for:

Following secure development practices
Applying this policy in day-to-day work

Technical leads

Responsible for:

Overseeing compliance
Reviewing development activity

Senior management

Responsible for:

Ensuring this policy is implemented and maintained
Compliance

Failure to follow this policy may introduce security risks and will be addressed through internal review and corrective action where required.

Review and maintenance

This policy is reviewed:

At least annually
Following significant changes to systems, technologies, or security requirements
Following major incidents or identified risks

Governance

The owner of this policy is Senior Management, Pobl Tech Ltd.

Responsibilities

The Document Owner is responsible for:

Keeping the policy accurate and up to date
Approving updates and changes
Ensuring the policy is communicated and applied

Approval

This policy has been reviewed and approved by senior management.

Approval confirms that the policy:

Reflects current working practices
Aligns with legal and contractual obligations
Is appropriate for the scale and nature of services delivered

Review schedule

This document will be reviewed:

At least annually
Following significant changes to systems, services, or regulatory requirements
Following major incidents or material changes in risk
Distribution

This policy is available to relevant staff and can be provided to clients or auditors where required.

Final note

Secure development is fundamental to how we deliver reliable and trusted digital systems.

By embedding security into every stage of the development lifecycle, we reduce risk and ensure that the platforms we build remain stable, secure, and fit for purpose over time.

Ready to turn ideas into bold digital experiences?