Secure Design Patterns

Free registration required

Executive Summary

The cost of fixing system vulnerabilities and the risk associated with vulnerabilities after system deployment are high for both developers and end users. While there are a number of best practices available to address the issue of software security vulnerabilities, these practices are often difficult to reuse due to the implementation-specific nature of the best practices. In addition, greater understanding of the root causes of security flaws has led to a greater appreciation of the importance of taking security into account in all phases in the software development life cycle, not just in the implementation and deployment phases. This paper describes a set of secure design patterns, which are descriptions or templates describing a general solution to a security problem.

  • Format: PDF
  • Size: 1164.5 KB