Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The rules in this standard may be extended with organization-specific rules. However, the rules in the standard must be obeyed to claim compliance conformance with the standard.

Training may be developed to educate software professionals regarding the appropriate application of secure coding standards. After passing an examination, these trained programmers may also be certified as secure coding professionals. For example, the Software Developer Certification (SDC) is a credentialing program developed at Carnegie Mellon University. The SDC uses authentic examination to

  1. Identify job candidates with specific programming skills
  2. Demonstrate the presence of a well-trained software workforce
  3. Provide guidance to educational and training institutions

Once a secure coding standard has been established, tools and processes can be developed or modified to determine compliance with the standard. One of the conditions for a coding practice to be considered a rule is that conformance can be verified. Verification can be performed manually or automated. Manual verification can be labor intensive and error prone. Tool verification is also problematic in that the ability of a static analysis tool to detect all violations of a rule must be proven for each product release because of possible regression errors. Even with these challenges, automated validation may be the only economically scalable solution to validate conformance with the coding standard.Software analysis tools may be certified as being able to verify compliance with the secure coding standard. Compliant software systems may be certified as compliant by a properly authorized certification body by the application of certified tools.Image Removed      00. Introduction       01. Preprocessor (PRE)