Solved

help classify if secure coding is optional & priority of implementation

Posted on 2016-07-17
1
64 Views
Last Modified: 2016-07-17
As there's shortage of resource & time, I need to take out some of the implementations
& prioritize the secure (re)-coding implementation.

Anyone care to fill up as much as possible : some of it are filled : refer to blue text
fifth column
Gnl-Secure-Coding-Guideline-v0-3ee.xlsx
0
Comment
Question by:sunhux
1 Comment
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 41715804
Added in yellow on the recommendation - hope it help. you will need to review in your context. Actually fundamental secure coding like avoid unsafe function (and etc) should be for all system and leave it to owner to prioritise instead otherwise it defeat purpose of checklist
Gnl-Secure-Coding-Guideline-v0-3ee-.xlsx
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article outlines the process to identify and resolve account lockout in an Active Directory environment.
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
This tutorial will introduce the viewer to VisualVM for the Java platform application. This video explains an example program and covers the Overview, Monitor, and Heap Dump tabs.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question