Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This secure coding standard consists of rules and recommendations.

Rules

Rules are meant to provide normative requirements for code; recommendations are meant to provide guidance that, when followed, should improve the safety, reliability, and security of software systems. However, a violation of a recommendation does not necessarily indicate the presence of a defect in the code. Rules and recommendations are collectively referred to as guidelines.

Rules

Rules must meet the following criteriaCoding practices are defined to be rules when the following conditions are met:

  1. Violation of the coding practice guideline is likely to result in a defect that may adversely affect the safety, reliability, or security of a system, for example, by introducing a  security flaw that may result in an exploitable vulnerability.
  2. The guideline does not rely on source code annotations or assumptions.
  3. Conformance to the coding practice guideline can be determined through automated analysis (either static or dynamic), formal methods, or manual inspection techniques.

Implementation of the secure coding rules defined in this standard are necessary (but not sufficient) to ensure the security of software systems developed in the C programming language.

...

  1. .

Recommendations

Recommendations are guidelines or suggestions . Coding practices for improving code quality. Guidelines are defined to be recommendations when all of the following conditions are met:

  1. Application of the coding practice a guideline is likely to improve system securitythe safety, reliability, or security of software systems.
  2. One or more of the requirements necessary for a coding practice guideline to be considered a rule cannot be met.

The set of recommendations that a particular development effort adopts depends on the security requirements of the final software product. Projects with high-security requirements can stricter requirements may decide to dedicate more resources to security and are consequently likely to adopt a larger set of recommendations.

To ensure that the source code conforms to this secure coding standard, it is necessary to have measures in place that check for rule violations. The most effective means of achieving this is to use one or more static analysis tools. Where a rule cannot be checked by a tool, then a manual review is required.

Recommendations are identified by the label recommendation.

Exceptions

Any rule or recommendation may specify a small set of exceptions detailing the circumstances under which the coding practice is not necessary to ensure the security of software. Exceptions are informative only and are not required to be followed.

Coding practices that specify one or more exceptions are identified by the label exceptions.

Identifiers

Each rule and recommendation is given a unique identifier. These identifiers consist of three parts:

  • A three-letter mnemonic representing the section of the standard
  • A two-digit numeric value in the range of 00 to 99
  • The letter C indicating that this is a C language guideline

The three-letter mnemonic can be used to group similar coding practices and to indicate to which category a coding practice belongs.

The numeric value is used to give each coding practice a unique identifier. Numeric values in the range of 00 to 29 are reserved for recommendations, and values in the range of 30 to 99 are reserved for rules.

Image Removed      00. Introduction       Image Removedensuring the safety, reliability, and security of a system and consequently are likely to adopt a broader set of recommendations.