12.07.2015 Views

Secure Coding SwA Pocket Guide - Build Security In - US-CERT

Secure Coding SwA Pocket Guide - Build Security In - US-CERT

Secure Coding SwA Pocket Guide - Build Security In - US-CERT

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Software Assurance (<strong>SwA</strong>) <strong>Pocket</strong> <strong>Guide</strong> Series<strong>SwA</strong> is primarily focused on software security and mitigating risks attributable to software; better enabling resilience inoperations. <strong>SwA</strong> <strong>Pocket</strong> <strong>Guide</strong>s are provided; with some yet to be published. All are offered as informative resources; notcomprehensive in coverage. All are intended as resources for ‘getting started’ with various aspects of software assurance. Theplanned coverage of topics in the <strong>SwA</strong> <strong>Pocket</strong> <strong>Guide</strong> Series is listed:<strong>SwA</strong> in Acquisition & OutsourcingI. Software Assurance in Acquisition and Contract LanguageII. Software Supply Chain Risk Management & Due-Diligence<strong>SwA</strong> in DevelopmentI. <strong>In</strong>tegrating <strong>Security</strong> in the Software Development Life CycleII. Key Practices for Mitigating the Most Egregious Exploitable Software WeaknessesIII. Software <strong>Security</strong> TestingIV. Requirements Analysis for <strong>Secure</strong> SoftwareV. Architecture & Design Considerations for <strong>Secure</strong> SoftwareVI. <strong>Secure</strong> <strong>Coding</strong>VII. <strong>Security</strong> Considerations for Technologies, Methodologies & Languages<strong>SwA</strong> Life Cycle SupportI. <strong>SwA</strong> in Education, Training & CertificationII. <strong>Secure</strong> Software Distribution, Deployment, & OperationsIII. Code Transparency & Software LabelsIV. Assurance Case ManagementV. Assurance Process Improvement & BenchmarkingVI. <strong>Secure</strong> Software Environment & Assurance EcosystemVII. Penetration Testing throughout the Life Cycle<strong>SwA</strong> Measurement & <strong>In</strong>formation NeedsI. Making Software <strong>Security</strong> MeasurableII. Practical Measurement Framework for <strong>SwA</strong> & <strong>In</strong>foSecIII. <strong>SwA</strong> Business Case<strong>SwA</strong> <strong>Pocket</strong> <strong>Guide</strong>s and related documents are freely available for download via the DHS NCSD Software AssuranceCommunity Resources and <strong>In</strong>formation Clearinghouse at https://buildsecurityin.us-cert.gov/swa.Software Assurance <strong>Pocket</strong> <strong>Guide</strong> Series:Development Volume VI – Version 2.0, , May 18, 2012<strong>Secure</strong> <strong>Coding</strong>29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!