...
Wiki Markup |
---|
\[[CWE - 272|AA. C References#CWE - 272]\] [Least Privilege Violation | http://cwe.mitre.org/data/definitions/272.html] \[[DHS 06|AA. C References#DHS 06]\] [Least Privilege | https://buildsecurityin.us-cert.gov/daisy/bsi/articles/knowledge/principles/351.html] \[[ISO/IEC PDTR 24772|AA. C References#ISO/IEC PDTR 24772]\] "XYN Privilege Management" \[[Saltzer 74|AA. C References#Saltzer 74]\] \[[Saltzer 75|AA. C References#Saltzer 75]\] \[[Wheeler 03|AA. C References#Wheeler 03]\] [Section 7.4, "Minimize Privileges"| http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/minimize-privileges.html] |
...
POS01-A. Check for the existence of links when dealing with files 50. POSIX (POS)