CHAPTER 38

WRITING SECURE CODE

Lester E. Nichols, M. E. Kabay, and Timothy Braithwaite

38.1 INTRODUCTION

38.2 POLICY AND MANAGEMENT ISSUES

38.2.1 Software Total Quality Management

38.2.2 Due Diligence

38.2.3 Regulatory and Compliance Considerations

38.3 TECHNICAL AND PROCEDURAL ISSUES

38.3.1 Requirements Analysis

38.3.2 Design

38.3.3 Operating System

38.3.4 Best Practices and Guidelines

38.3.5 Languages

38.4 TYPES OF SOFTWARE ERRORS

38.4.1 Internal Design or Implementation Errors

38.5 ASSURANCE TOOLS AND TECHNIQUES

38.5.1 Education Resources

38.5.2 Code Examination and Application Penetration Testing

38.5.3 Standards and Best Practices

38.6 CONCLUDING REMARKS

38.7 FURTHER READING

38.1 INTRODUCTION.

The topic of secure coding cannot be adequately addressed in a single chapter. Unfortunately, programs are inherently difficult to secure because of the large number of ways that execution can traverse the code as a result of different input sequences and data values.

This chapter provides a starting point and additional resources for security professionals, system architects, and developers to build a successful and secure development methodology. Writing secure code takes coordination and cooperation of various functional areas within an organization, and may require fundamental changes in the way software development currently is designed, written, tested, and implemented.

38.2 POLICY AND MANAGEMENT ISSUES.

There are countless security hurdles facing those writing code and developing ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.