You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

This coding standard is organized into an introductory chapter and eighteen chapters containing rules in specific topic areas. Each of these eighteen chapters contains a list of rules in that section, a risk assessment summary for these rules, and a list of related rules. There is also a common glossary and bibliography.

Rules have a consistent structure. Each rule has a unique identifier, which is included in the title. The title of the rules and the introductory paragraphs define the conformance requirements. This is typically followed by one or more pairs of noncompliant code examples and corresponding compliant solutions. Each rule also includes a risk assessment and bibliographical references specific to that rule. When applicable, rules also list related guidelines from the following sources:

  • The CERT C Secure Coding Standard [[Seacord 2008]]

  • The CERT C++ Secure Coding Standard [[CERT 2011]]

  • ISO/IEC TR 24772. Information Technology — Programming Languages — Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use [[ISO/IEC TR 24772:2010]]

  • MITRE CWE [[MITRE 2011]]

  • Secure Coding Guidelines for the Java Programming Language, version 2.0 [[SCG 2007]]

  • Secure Coding Guidelines for the Java Programming Language, version 3.0 [[SCG 2009]]

  • The Elements of Java Style [Rogue 2000]
  • No labels