This coding standard is organized into an introductory chapter and eighteen seventeen chapters containing guidelines rules in specific topic areas. Each of these eighteen the rule chapters contains a list of guidelines rules in that section, and a risk assessment summary for these guidelines, and a list of related guidelinesthe rules. There is also a common glossary and bibliography. This preface was meant to be read first, followed by the introductory chapter. The rule chapters may be read in any order or used as reference material as appropriate. The rules are loosely organized in each chapter but, in general, may also be read in any order.
Rules Guidelines have a consistent structure. Each guideline rule has a unique identifier, which is included in the title. The title of the guidelines rules and the introductory paragraphs define the conformance requirements. This is typically followed by one or more pairs sets of noncompliant code examples and corresponding compliant solutions. Each guideline rule also includes a risk assessment and bibliographical references specific to that guideline. rule. When applicable, rules also list related vulnerabilities and related guidelines from the following sources:
- The CERT C Secure Coding Standard [Seacord 2008]
- The CERT C++ Secure Coding Standard [CERT 2011]
- ISO/IEC TR 24772. Information Technology â” Programming Languages â” Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use [ISO/IEC TR 24772:2010]
- MITRE CWE [MITRE 2011]
- Secure Coding Guidelines for the Java Programming Language, version 3.0 [SCG 2009]
- The Elements of Java Style [Rogue 2000]