说明:收录25万 73个行业的国家标准 支持批量下载
文库搜索
切换导航
文件分类
频道
联系我们
问题反馈
文件分类
联系我们
问题反馈
批量下载
Fundamental Practices for Secure Software Development Third Edition March 2018 c . 5 b u Essential Elements of a Secure Development Lifecycle Program h t i g © 2018 SAFECode – All Rights Reserved. m o Fundamental Practices for Secure Software Development Table of Contents Executive Summary .................................................................................................................................... 4 Introduction ................................................................................................................................................. 5 Audience ................................................................................................................................................. 5 SAFECode Guidance and Software Assurance Programs ..................................................................... 6 Application Security Control Definition .................................................................................................... 7 Actively Manage Application Security Controls ...................................................................................... 7 m o Design .......................................................................................................................................................... 9 Secure Design Principles ....................................................................................................................... 9 c . 5 Threat Modeling .................................................................................................................................... 10 Develop an Encryption Strategy ........................................................................................................... 11 Standardize Identity and Access Management .................................................................................... 12 b u Establish Log Requirements and Audit Practices ................................................................................ 14 Secure Coding Practices .......................................................................................................................... 15 h t i g Establish Coding Standards and Conventions ..................................................................................... 15 Use Safe Functions Only ...................................................................................................................... 15 Use Code Analysis Tools To Find Security Issues Early ..................................................................... 17 Handle Data Safely ............................................................................................................................... 17 Handle Errors........................................................................................................................................ 20 Manage Security Risk Inherent in the Use of Third-party Components .............................................. 21 Testing and Validation .............................................................................................................................. 22 Automated Testing ............................................................................................................................... 22 Manual Testing ..................................................................................................................................... 24 Manage Security Findings........................................................................................................................ 27 Define Severity ..................................................................................................................................... 27 Risk Acceptance Process ..................................................................................................................... 28 Vulnerability Response and Disclosure ................................................................................................. 29 Define Internal and External Policies ................................................................................................... 29 Define Roles and Responsibilities ........................................................................................................ 29 Ensure that Vulnerability Reporters Know Whom to Contact ............................................................... 30 Manage Vulnerability Reporter
SAFECode_Fundamental_Practices_for_Secure_Software_Development_March_2018 (SAFECode 安全软件开发基本实践)
文档预览
英文文档
38 页
50 下载
1000 浏览
0 评论
0 收藏
3.0分
赞助2元下载(无需注册)
温馨提示:本文档共38页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
下载文档到电脑,方便使用
赞助2元下载
本文档由 路人甲 于
2022-05-30 11:53:07
上传分享
举报
下载
原文档
(762.2 KB)
分享
友情链接
GB-T 15320-2001节能产品评价导则.pdf
GM-T 0005-2012 随机性检测规范.pdf
GB-T 20834-2014 发电电动机基本技术条件.pdf
GA-T 1781-2021 公共安全社会视频资源安全联网设备技术要求.pdf
T-GDIIA 005—2021 信息技术应用创新项目运行维护服务标准.pdf
GB-T 34362-2017 无损检测 适形阵列涡流检测导则.pdf
GB-T 35391-2017 无损检测 工业计算机层析成像(CT)检测用空间分辨力测试卡.pdf
GB-T 16603-2017 锦纶牵伸丝.pdf
ISO 13400-2 2019 Amd 1 2023 Road vehicles — Diagnostic communication over Internet Prot.pdf
GB-T 36084-2018 纳米技术 水溶液中铜、锰、铬离子含量的测定 紫外-可见分光光度法.pdf
GB-T 41121-2021 玻璃水滑道安全技术要求.pdf
T-CES 184—2022 中低压配电网快速插拔电缆连接器配置技术导则.pdf
众城智库 信创产业发展报告 2021.pdf
人工智能语言对话大模型合集.pdf
艾瑞咨询2024年AIGC教育行业报告55页.pdf
GB-T 34095-2017 信息安全技术 用于电子支付的基于近距离无线通信的移动终端安全技术要求.pdf
GB-T 34942-2017 信息安全技术 云计算服务安全能力评估方法.pdf
德勤数字化转型新篇章.pdf
GB-T 27000-2023 合格评定 词汇和通用原则.pdf
GB-T 34610-2017 节水型企业 炼焦行业.pdf
交流群
-->
1
/
3
38
评价文档
赞助2元 点击下载(762.2 KB)
回到顶部
×
微信扫码支付
2
元 自动下载
官方客服微信:siduwenku
支付 完成后 如未跳转 点击这里 下载
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们
微信(点击查看客服)
,我们将及时删除相关资源。