国家标准网
文库搜索
切换导航
文件分类
频道
仅15元无限下载
联系我们
问题反馈
文件分类
仅15元无限下载
联系我们
问题反馈
批量下载
Fundamental Practices for Secure Software Development Third Edition March 2018 c . 5 b u Essential Elements of a Secure Development Lifecycle Program h t i g © 2018 SAFECode – All Rights Reserved. m o Fundamental Practices for Secure Software Development Table of Contents Executive Summary .................................................................................................................................... 4 Introduction ................................................................................................................................................. 5 Audience ................................................................................................................................................. 5 SAFECode Guidance and Software Assurance Programs ..................................................................... 6 Application Security Control Definition .................................................................................................... 7 Actively Manage Application Security Controls ...................................................................................... 7 m o Design .......................................................................................................................................................... 9 Secure Design Principles ....................................................................................................................... 9 c . 5 Threat Modeling .................................................................................................................................... 10 Develop an Encryption Strategy ........................................................................................................... 11 Standardize Identity and Access Management .................................................................................... 12 b u Establish Log Requirements and Audit Practices ................................................................................ 14 Secure Coding Practices .......................................................................................................................... 15 h t i g Establish Coding Standards and Conventions ..................................................................................... 15 Use Safe Functions Only ...................................................................................................................... 15 Use Code Analysis Tools To Find Security Issues Early ..................................................................... 17 Handle Data Safely ............................................................................................................................... 17 Handle Errors........................................................................................................................................ 20 Manage Security Risk Inherent in the Use of Third-party Components .............................................. 21 Testing and Validation .............................................................................................................................. 22 Automated Testing ............................................................................................................................... 22 Manual Testing ..................................................................................................................................... 24 Manage Security Findings........................................................................................................................ 27 Define Severity ..................................................................................................................................... 27 Risk Acceptance Process ..................................................................................................................... 28 Vulnerability Response and Disclosure ................................................................................................. 29 Define Internal and External Policies ................................................................................................... 29 Define Roles and Responsibilities ........................................................................................................ 29 Ensure that Vulnerability Reporters Know Whom to Contact ............................................................... 30 Manage Vulnerability Reporter
SAFECode_Fundamental_Practices_for_Secure_Software_Development_March_2018 (SAFECode 安全软件开发基本实践)
文档预览
英文文档
38 页
50 下载
1000 浏览
0 评论
0 收藏
3.0分
赞助2元下载(无需注册)
温馨提示:本文档共38页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
下载文档到电脑,方便使用
赞助2元下载
本文档由 路人甲 于
2022-05-30 11:53:07
上传分享
举报
下载
原文档
(762.2 KB)
分享
友情链接
GB-T 18488.2-2015 电动汽车用驱动电机系统 第2部分:试验方法.pdf
GB-T 1425-2021 贵金属及其合金熔化温度范围的测定 热分析试验方法.pdf
证券公司网络和信息安全三年提升计划(2023-2025).pdf
法律法规 杭州市民用建筑节能条例2014-12-31.pdf
GB-T 5624-2019 汽车维修术语.pdf
GB-T 25295-2010 电气设备安全设计导则.pdf
T-SXAGS 0012—2020 山西好粮油 小麦粉.pdf
GB-T 35307-2023 流化床法颗粒硅.pdf
GB-T 9567-2016 工业用三聚氰胺.pdf
穿越数据的迷宫扫描版.pdf
悬镜安全子芽 浅谈DevSecOps敏捷安全发展趋势 2021.pdf
DB13-T 1460-2011 电热地暖系统安全与节能规范 河北省.pdf
DB36-T 1584-2022 电子政务外网企事业单位接入技术规范 江西省.pdf
GB-T 42606-2023 固定式压力容器修理导则.pdf
GB-T 40753-2021 供应链安全管理体系 ISO 28000实施指南 ISO 28004-2007.pdf
IPC-A-610 电子组件的可接受性.pdf
GB-T 27002-2011 合格评定 保密性 原则和要求.pdf
GB-T 37401-2019 电子商务平台服务保障技术要求.pdf
GB-T 33910-2017 汽车用铝及铝合金挤压型材.pdf
ISO IEC 19770-1 2017 Amd 1 2024 Information technology — IT asset manage.pdf
1
/
3
38
评价文档
赞助2元 点击下载(762.2 KB)
回到顶部
×
微信扫码支付
2
元 自动下载
官方客服微信:siduwenku
支付 完成后 如未跳转 点击这里 下载
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们
微信(点击查看客服)
,我们将及时删除相关资源。