Skip to main content
A Singapore Government Agency Website How to identify
Official website links end with .gov.sg
Government agencies communicate via .gov.sg websites (e.g. go.gov.sg/open). Trusted websites
Secure websites use HTTPS
Look for a lock () or https:// as an added precaution. Share sensitive information only on official, secure websites.

Sandbox

Pilot Sandbox System Security Plan.

Last updated 24 March 2026

System Characteristics

AS: Application Security (15)

AS-1: Input Validation

Control Statement

Control Recommendations

Risk Statement

AS-2: Parameterised Interfaces

Control Statement

Control Recommendations

Risk Statement

AS-3: Output Sanitisation

Control Statement

Control Recommendations

Risk Statement

AS-4: Authentication Mechanism Rate-Limiting

Control Statement

Control Recommendations

Risk Statement

AS-5: Password Requirements

Control Statement

Control Recommendations

Risk Statement

Parameters

AS-6: Password Salting and Hashing

Control Statement

Control Recommendations

Risk Statement

AS-7: Access Control Check Enforcement

Control Statement

Control Recommendations

Risk Statement

AS-8: Secrets Management

Control Statement

Control Recommendations

Risk Statement

AS-9: Content Security Policy (CSP)

Control Statement

Control Recommendations

Risk Statement

AS-10: HTTP Strict Transport Security (HSTS)

Control Statement

Control Recommendations

Risk Statement

AS-11: Session Management

Control Statement

Control Recommendations

Risk Statement

Parameters

AS-12: Malware Scanning of Uploaded Files

Control Statement

Control Recommendations

Risk Statement

AS-13: Exposure of Internal System Details

Control Statement

Control Recommendations

Risk Statement

AS-14: Secure Cryptographic Libraries

Control Statement

Control Recommendations

Risk Statement

AS-15: Password Change

Control Statement

Control Recommendations

Risk Statement

SC: Software Supply Chain (9)

SC-1: Code Repository

Control Statement

Control Recommendations

Risk Statement

SC-2: Commit Signing

Control Statement

Control Recommendations

Risk Statement

SC-3: Peer Review

Control Statement

Control Recommendations

Risk Statement

SC-4: Dependency Manifest Version Pinning

Control Statement

Control Recommendations

Risk Statement

SC-5: Build and Release Process

Control Statement

Control Recommendations

Risk Statement

SC-6: Dependency Installation during Deployment

Control Statement

Control Recommendations

Risk Statement

SC-7: Software Artefact Signing

Control Statement

Control Recommendations

Risk Statement

SC-8: Software Artefact Signature Verification

Control Statement

Control Recommendations

Risk Statement

SC-9: Internal Code Collaboration and Sharing

Control Statement

Control Recommendations

Risk Statement

ST: Security Testing (5)

ST-1: Vulnerability Assessment

Control Statement

Control Recommendations

Risk Statement

Parameters

ST-2: Cloud Security Posture Management

Control Statement

Control Recommendations

Risk Statement

ST-3: Public Vulnerability Disclosure Programme

Control Statement

Control Recommendations

Risk Statement

Parameters

ST-4: Security Testing Programme

Control Statement

Control Recommendations

Risk Statement

Parameters

ST-5: Vulnerability Management

Control Statement

Control Recommendations

Risk Statement

Parameters

NS: Network Security (8)

NS-1: Network and System Component Segmentation

Control Statement

Control Recommendations

Risk Statement

NS-2: Access Restrictions on CSP Resources Outside Virtual Network

Control Statement

Control Recommendations

Risk Statement

NS-3: Deny by Default - Allow by Exception

Control Statement

Control Recommendations

Risk Statement

NS-4: Inter-Private Network Connectivity

Control Statement

Control Recommendations

Risk Statement

NS-5: Network and Application Layer Filtering

Control Statement

Control Recommendations

Risk Statement

NS-6: Valid and Trusted SSL/TLS Certificates

Control Statement

Control Recommendations

Risk Statement

NS-7: Secure Inter-Service Communication

Control Statement

Control Recommendations

Risk Statement

NS-8: Secure Cloud and On-Premises Connectivity

Control Statement

Control Recommendations

Risk Statement

BR: Backup and Recovery (3)

BR-1: Backup

Control Statement

Control Recommendations

Risk Statement

Parameters

BR-2: Recovery Testing

Control Statement

Control Recommendations

Risk Statement

Parameters

BR-3: Backup Retention

Control Statement

Control Recommendations

Risk Statement

Parameters

DP: Data Protection (4)

DP-1: Data Residency

Control Statement

Control Recommendations

Risk Statement

Parameters

DP-2: Data at Rest Encryption

Control Statement

Control Recommendations

Risk Statement

DP-3: Data in Transit Encryption

Control Statement

Control Recommendations

Risk Statement

DP-4: Central Cloud Tenant Management

Control Statement

Control Recommendations

Risk Statement

Parameters

LM: Logging and Monitoring (18)

LM-1: Separate Log Storage

Control Statement

Control Recommendations

Risk Statement

LM-2: Tamper-Resistant Log Storage

Control Statement

Control Recommendations

Risk Statement

LM-3: Network Flow Logging

Control Statement

Control Recommendations

Risk Statement

LM-4: Audit Logging

Control Statement

Control Recommendations

Risk Statement

LM-5: Database Logging

Control Statement

Control Recommendations

Risk Statement

LM-6: Access Logging

Control Statement

Control Recommendations

Risk Statement

LM-7: Host Security Event Logging

Control Statement

Control Recommendations

Risk Statement

LM-8: Security Log Retention

Control Statement

Control Recommendations

Risk Statement

Parameters

LM-9: Security Monitoring and Alerting

Control Statement

Control Recommendations

Risk Statement

LM-10: Resource Usage Monitoring and Alerting

Control Statement

Control Recommendations

Risk Statement

LM-11: Service Level Monitoring and Alerting

Control Statement

Control Recommendations

Risk Statement

LM-12: Central Security Log Management and Monitoring

Control Statement

Control Recommendations

Risk Statement

Parameters

LM-13: Anomalous Database Activity Monitoring

Control Statement

Control Recommendations

Risk Statement

LM-14: Web Defacement Monitoring

Control Statement

Control Recommendations

Risk Statement

LM-15: Structured Log Formatting

Control Statement

Control Recommendations

Risk Statement

LM-16: Key Signals Monitoring

Control Statement

Control Recommendations

Risk Statement

LM-17: Software delivery performance monitoring

Control Statement

Control Recommendations

Risk Statement

LM-19: Log Sanitisation

Control Statement

Control Recommendations

Risk Statement

AC: Access Control (14)

AC-1: Principle of Least Privilege

Control Statement

Control Recommendations

Risk Statement

AC-2: Multi-Factor Authentication (MFA)

Control Statement

Control Recommendations

Risk Statement

AC-3: Inactive and Expired Accounts

Control Statement

Control Recommendations

Risk Statement

Parameters

AC-4: Access Review

Control Statement

Control Recommendations

Risk Statement

Parameters

AC-5: Endpoint Device Hardening

Control Statement

Control Recommendations

Risk Statement

AC-6: Default Credentials

Control Statement

Control Recommendations

Risk Statement

AC-7: Singpass/Corppass for Public Users

Control Statement

Control Recommendations

Risk Statement

AC-8: Automated Account Lifecycle Management

Control Statement

Control Recommendations

Risk Statement

Parameters

AC-9: Endpoint Device Management

Control Statement

Control Recommendations

Risk Statement

AC-10: Identity and Device-Based Access Control

Control Statement

Control Recommendations

Risk Statement

AC-11: Single User Endpoints

Control Statement

Control Recommendations

Risk Statement

Parameters

AC-12: Single Sign-On (SSO) for Internal Services and Accounts

Control Statement

Control Recommendations

Risk Statement

AC-13: Static Credential Expiry and Rotation

Control Statement

Control Recommendations

Risk Statement

Parameters

AC-14: Inventory of Accounts

Control Statement

Control Recommendations

Risk Statement

CS: Container Security (11)

CS-1: Unique Base Container Image Tags

Control Statement

Control Recommendations

Risk Statement

CS-2: Minimal Base Container Images

Control Statement

Control Recommendations

Risk Statement

CS-3: Runtime Container Secrets

Control Statement

Control Recommendations

Risk Statement

CS-4: Non-Privileged Container User

Control Statement

Control Recommendations

Risk Statement

CS-5: Dockerfile Linting

Control Statement

Control Recommendations

Risk Statement

CS-6: Read-Only Container Root Filesystem

Control Statement

Control Recommendations

Risk Statement

CS-7: Container Image Scanning

Control Statement

Control Recommendations

Risk Statement

Parameters

CS-8: Private Container Image Registries

Control Statement

Control Recommendations

Risk Statement

CS-9: Container Orchestrator API Access Control

Control Statement

Control Recommendations

Risk Statement

CS-10: Container Workload Segmentation

Control Statement

Control Recommendations

Risk Statement

CS-11: Container Runtime Security

Control Statement

Control Recommendations

Risk Statement

PM: Security Programme Management (6)

PM-1: Cybersecurity Incident Management Plan

Control Statement

Control Recommendations

Risk Statement

PM-2: Risk Assessment

Control Statement

Control Recommendations

Risk Statement

Parameters

PM-3: System Security Plan (SSP) Development

Control Statement

Control Recommendations

Risk Statement

PM-4: Approval of Residual Risks

Control Statement

Control Recommendations

Risk Statement

Parameters

PM-5: Central Submission of Approved System Security Plan (SSP)

Control Statement

Control Recommendations

Risk Statement

PM-6: System Documentation

Control Statement

Control Recommendations

Risk Statement

IS: Infrastructure Security (14)

IS-1: Management Agents

Control Statement

Control Recommendations

Risk Statement

IS-2: Automated Patch Management Tools

Control Statement

Control Recommendations

Risk Statement

IS-3: Restricted Administrator Privileges

Control Statement

Control Recommendations

Risk Statement

IS-4: Least Functionality

Control Statement

Control Recommendations

Risk Statement

IS-5: Host System Hardening

Control Statement

Control Recommendations

Risk Statement

IS-6: Remote Administration

Control Statement

Control Recommendations

Risk Statement

IS-7: Malware Protection

Control Statement

Control Recommendations

Risk Statement

IS-8: Endpoint Detection and Response (EDR)

Control Statement

Control Recommendations

Risk Statement

IS-9: End-of-Support (EOS) Assets

Control Statement

Control Recommendations

Risk Statement

Parameters

IS-10: Synchronise time clocks

Control Statement

Control Recommendations

Risk Statement

IS-11: Central Domain Name Registration

Control Statement

Control Recommendations

Risk Statement

IS-12: DNS Security Extensions (DNSSEC)

Control Statement

Control Recommendations

Risk Statement

IS-13: Defensive Domain Name Registration

Control Statement

Control Recommendations

Risk Statement

IS-14: Singapore SMS Sender ID Registry Registration

Control Statement

Control Recommendations

Risk Statement

SD: Secure Development (8)

SD-1: Push Protection for Secrets

Control Statement

Control Recommendations

Risk Statement

SD-2: Default Branch Push Permissions

Control Statement

Control Recommendations

Risk Statement

SD-3: Continuous Integration (CI) Tests

Control Statement

Control Recommendations

Risk Statement

SD-4: Static Analysis

Control Statement

Control Recommendations

Risk Statement

Parameters

SD-5: Dependency Scanning

Control Statement

Control Recommendations

Risk Statement

Parameters

SD-6: Secret Detection

Control Statement

Control Recommendations

Risk Statement

Parameters

SD-7: CI Environment Variable Secrets Management

Control Statement

Control Recommendations

Risk Statement

SD-8: Deployment Environment Segregation

Control Statement

Control Recommendations

Risk Statement

CK: Cryptography, Encryption and Key Management (2)

CK-1: Cryptographic Key Establishment

Control Statement

Control Recommendations

Risk Statement

CK-2: Cryptographic Key Rotation

Control Statement

Control Recommendations

Risk Statement

Parameters