Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: This page needed some love.

...

Noncompliant code examples are typically followed by compliant solutions, which show how the noncompliant code example can be recoded modified in a secure, compliant manner. Except where noted, noncompliant code examples should contain violations only of the guideline under discussion. Compliant solutions should comply with all of the secure coding rules but may on occasion fail to comply with a recommendation.

...

Any rule or recommendation may specify a small set of exceptions detailing the circumstances under which the guideline is not necessary to ensure the safety, reliability, or security of software. Exceptions are informative only and are not required to be followed.

Identifiers

Each rule and recommendation is given a unique identifier. These identifiers consist of three parts:

...

The numeric value is used to give each coding practice a unique identifier. Numeric values in the range of 00 through 29 49 are reserved for recommendations, and values in the range of 30 50 through 99 are reserved for rules.

...