Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Violation of the coding practice will result in a security flaw that may result in an exploitable vulnerability.
  2. There is an enumerable set of exceptional conditions (or no such conditions) where in which violating the coding practice is necessary to ensure the correct behavior for the program.
  3. Conformance to the coding practice can be verified.

Rules must be followed to claim compliance with this standard unless an exceptional condition exists. If an exceptional condition is claimed, the exception must correspond to a pre-defined predefined exceptional condition and the application of this exception must be documented in the source code.

...

Compliance with recommendations is not necessary to claim compliance with this standard. It is possible, however, to claim compliance with recommendations (especially in cases in cased where which compliance can be verified). The set of recommendations that a particular development effort adopts depends on the security requirements of the final software product. Projects with high-security requirements can dedicate more resources to security and are thus likely to adopt a larger set of recommendations.

...