{"id":11,"date":"2026-03-08T11:16:08","date_gmt":"2026-03-08T11:16:08","guid":{"rendered":"https:\/\/security-by-design.nl\/?page_id=10"},"modified":"2026-03-08T11:16:08","modified_gmt":"2026-03-08T11:16:08","slug":"security-by-design","status":"publish","type":"page","link":"https:\/\/security-by-design.nl\/index.php\/security-by-design\/","title":{"rendered":"Security by Design"},"content":{"rendered":"\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/webstore.iec.ch\/publication\/33615\">IEC 62443-4-1<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/webstore.iec.ch\/publication\/63293\">IEC 81001-5-1 (Healthcare)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/csrc.nist.gov\/projects\/ssdf\">Secure Software Development Framework (SSDF)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.iso27001security.com\/html\/27034.html\">ISO 27034<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-160\/vol-1-rev-1\/final\">NIST 800-160<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.gsma.com\/security\/resources\/fs-16-network-equipment-security-assurance-scheme-development-and-lifecycle-security-requirements\/\">GSMA FS.16<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/sdl\">Microsoft SDL<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/securesoftwarealliance.org\/framework-secure-software\/\">Dutch Secure Software Alliance Framework<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/safecode.org\/\">Safecode<\/a><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-11","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/security-by-design.nl\/index.php\/wp-json\/wp\/v2\/pages\/11","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security-by-design.nl\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/security-by-design.nl\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/security-by-design.nl\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/security-by-design.nl\/index.php\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":0,"href":"https:\/\/security-by-design.nl\/index.php\/wp-json\/wp\/v2\/pages\/11\/revisions"}],"wp:attachment":[{"href":"https:\/\/security-by-design.nl\/index.php\/wp-json\/wp\/v2\/media?parent=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}