12.07.2015 Views

Secure Coding SwA Pocket Guide - Build Security In - US-CERT

Secure Coding SwA Pocket Guide - Build Security In - US-CERT

Secure Coding SwA Pocket Guide - Build Security In - US-CERT

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ConclusionThis pocket guide compiles best practices and resources on the subject of secure coding. The material and resources providedin the guide can be used as a starting point for making a secure and repeatable coding process. As stated at the beginning, it isnot the purpose of this <strong>Guide</strong> to provide a comprehensive description of every security situation that can arise while developingcode. Rather, the <strong>Guide</strong> offers basic direction for establishing good secure coding processes and procedures. Developers shouldreview the referenced documents to extend their knowledge of secure coding.For a more interactive way of learning secure coding see the mini-courses offered by the SANS Software <strong>Security</strong> <strong>In</strong>stitute.<strong>CERT</strong> and SEI also offer a “<strong>Secure</strong> <strong>Coding</strong> in C” course through the Carnegie Mellon University Open Learning <strong>In</strong>itiative.(Register with the course key: seccode.) Google and OWASP also offer teaching tools — Gruyere (previously called Jarlsberg)and WebGoat, respectively — that allows users to learn about common secure coding mistakes. Microsoft has made a significanteffort to share with all developers, lessons learned, tools and techniques to improve secure coding efforts. The industry groupSAFECode also has a host of company-agnostic materials. These secure coding lessons that can be implemented over a widerange of development efforts. There exists a whole host of valuable information on how to write code securely, the challenge is inadopting this information into a specific development process.The Software Assurance <strong>Pocket</strong> <strong>Guide</strong> Series is developed in collaboration with the <strong>SwA</strong> Forum and Working Groups andprovides summary material in a more consumable format. The series provides informative material for <strong>SwA</strong> initiatives that seekto reduce software vulnerabilities, minimize exploitation, and address ways to improve the routine development, acquisition, anddeployment of trustworthy software products. It should be understood by the reader that these pocket guides are not anauthoritative source, they simply reference and point to authoritative sources. Together, these activities will enable more secureand reliable software that supports mission requirements across enterprises and critical infrastructure.For additional information or contribution to future material and/or enhancements of this pocket guide, please consider joiningany of the <strong>SwA</strong> Working Groups and/or send comments to Software.Assurance@dhs.gov. <strong>SwA</strong> Forums are open to allparticipants and free of charge. Please visit https://buildsecurityin.us-cert.gov for further information.No WarrantyThis material is furnished on an “as-is” basis for information only. The authors, contributors, and participants of the <strong>SwA</strong> Forumand Working Groups, their employers, the U.S. Government, other participating organizations, all other entities associated withthis information resource, and entities and products mentioned within this pocket guide make no warranties of any kind, eitherexpressed or implied, as to any matter including, but not limited to, warranty of fitness for purpose, completeness ormerchantability, exclusivity, or results obtained from use of the material. No warranty of any kind is made with respect to freedomfrom patent, trademark, or copyright infringement. Reference or use of any trademarks is not intended in any way to infringe onthe rights of the trademark holder. No warranty is made that use of the information in this pocket guide will result in software thatis secure. Examples are for illustrative purposes and are not intended to be used as is or without undergoing analysis.ReprintsAny Software Assurance <strong>Pocket</strong> <strong>Guide</strong> may be reproduced and/or redistributed in its original configuration, within normaldistribution channels (including but not limited to on-demand <strong>In</strong>ternet downloads or in various archived/compressed formats).Software Assurance <strong>Pocket</strong> <strong>Guide</strong> Series:Development Volume VI – Version 2.0, , May 18, 2012<strong>Secure</strong> <strong>Coding</strong>27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!