Différences
Ci-dessous, les différences entre deux révisions de la page.
en:cs:quality_report [2018/02/11 22:00] – [Corporate requirements] fraggle | en:cs:quality_report [2021/12/27 18:25] (Version actuelle) – modification externe 127.0.0.1 | ||
---|---|---|---|
Ligne 210: | Ligne 210: | ||
==== Role of the Product Standard Security requirements ==== | ==== Role of the Product Standard Security requirements ==== | ||
- | By introducing the risk-based secure Software Development Lifecycle the product standard security acts as product security knowledge base containing best practices of secure software development and as a threat-library for the program specific risk assessment. The question whether a program needs to comply with a product standard requirement or not depends on the underlying risk that was identified and rated during the risk assessment. | + | By introducing the risk-based secure Software Development Lifecycle the product standard security acts as product security knowledge base containing best practices of secure software development and as a threat-library for the program specific risk assessment. The question whether a program needs to comply with a product standard requirement or not depends on the underlying risk that was identified and rated during the risk assessment. |
In case of corporate violations in addition an exceptional approval needs to be requested. | In case of corporate violations in addition an exceptional approval needs to be requested. | ||
- | Links to the requirements | + | List of the requirements |
==== List of Product Standard Requirements ==== | ==== List of Product Standard Requirements ==== | ||
Ligne 275: | Ligne 275: | ||
| SEC-244 - Deliver with a secure default configuration | | |X| | | SEC-244 - Deliver with a secure default configuration | | |X| | ||
| SEC-275 - Enforce address space layout randomization, | | SEC-275 - Enforce address space layout randomization, | ||
- | | Secure-by-design | | | | | + | | **Secure-by-design** | | | | |
| SEC-219 - Provide a risk-adequate second line of defense against malicious input from the Internet | | |X| | | SEC-219 - Provide a risk-adequate second line of defense against malicious input from the Internet | | |X| | ||
| SEC-228 - Protect upload, download and display functions of untrusted files against MIME-type sniffing and virus attacks | | |X| | | SEC-228 - Protect upload, download and display functions of untrusted files against MIME-type sniffing and virus attacks | | |X| |