Security

From Guidance Share

(Difference between revisions)
Jump to: navigation, search
Revision as of 08:21, 8 August 2007 (edit)
Admin (Talk | contribs)

← Previous diff
Revision as of 20:12, 1 December 2007 (edit)
JD (Talk | contribs)

Next diff →
Line 9: Line 9:
<!-- Start of left-column --> <!-- Start of left-column -->
{|style="border-spacing:8px;margin:0px -8px;" {|style="border-spacing:8px;margin:0px -8px;"
-|class="MainPageBG" style="width:50%;border:1px solid #ccc;vertical-align:top;color:#000;"|+|class="MainPageBG" style="width:50%;border:0px solid #ccc;vertical-align:top;color:#000;"|
<!-- |class="MainPageBG" style="width:50%;border:1px solid #ccc;vertical-align:top;color:#000;"| --> <!-- |class="MainPageBG" style="width:50%;border:1px solid #ccc;vertical-align:top;color:#000;"| -->
{|width="100%" cellpadding="2" cellspacing="5" style="vertical-align:top" {|width="100%" cellpadding="2" cellspacing="5" style="vertical-align:top"
-! <h2 style="margin:0;background-color:#aaccff;font-family:sans-serif;font-size:140%;font-weight:bold;border:1px solid #a3b0bf;text-align:center;color:#000;padding:0.2em 0.4em;">Focus Centers</h2>+! <h2 style="margin:0;font-variant:small-caps;font-weight:bold;text-align:center;color:#000;padding:0.2em 0.4em;">Focus Centers</h2>
-<!--+
-! <h2 style="margin:0;background-color:#cedff2;font-family:sans-serif;font-size:120%;font-weight:bold;border:1px solid #a3b0bf;text-align:center;color:#000;padding:0.2em 0.4em;">Focus Centers</h2>+
--->+
|- |-
| style="color:#000"|<div style="padding-left:1em"> | style="color:#000"|<div style="padding-left:1em">
Line 39: Line 36:
<!-- Start of right-column --> <!-- Start of right-column -->
-|class="MainPageBG" style="width:50%;border:1px solid #ccc;vertical-align:top"|+|class="MainPageBG" style="width:50%;border:0px solid #ccc;vertical-align:top"|
{| width="100%" cellpadding="2" cellspacing="5" style="vertical-align:top" {| width="100%" cellpadding="2" cellspacing="5" style="vertical-align:top"
-! <h2 style="margin:0;background-color:#aaccff;font-family:sans-serif;font-size:140%;font-weight:bold;border:1px solid #a3b0bf;text-align:center;color:#000;padding:0.2em 0.4em;">Tech Centers</h2>+! <h2 style="margin:0;font-variant:small-caps;font-weight:bold;text-align:center;color:#000;padding:0.2em 0.4em;">Tech Centers</h2>
|- |-
|style="color:#000"|<div style="padding-left:1em"> |style="color:#000"|<div style="padding-left:1em">
Line 53: Line 50:
|- |-
-! <h2 style="margin:0;background-color:#aaccff;font-family:sans-serif;font-size:140%;font-weight:bold;border:1px solid #a3b0bf;text-align:center;#000:white;padding:0.2em 0.4em;">Knowledge Base</h2>+! <h2 style="margin:0;font-variant:small-caps;font-weight:bold;text-align:center;#000:white;padding:0.2em 0.4em;">Knowledge Base</h2>
|- |-
|style="color:#000;align:center"|<div style="padding-left:1em"> |style="color:#000;align:center"|<div style="padding-left:1em">
-[[Security At a Glances | At a Glance]] &nbsp;&ndash;+* [[Security At a Glances | At a Glance]]
-[[Security Cheat Sheets | Cheat Sheets]] &nbsp;&ndash;+* [[Security Cheat Sheets | Cheat Sheets]]
-[[Security Checklists | Checklists]] &nbsp;&ndash;+* [[Security Checklists | Checklists]]
-[[Security Explained | Explained]] &nbsp;&ndash;+* [[Security Explained | Explained]]
-[[Security Guidelines | Guidelines]] &nbsp;&ndash;+* [[Security Guidelines | Guidelines]]
-[[Security How Tos | How Tos]] &nbsp;&ndash;+* [[Security How Tos | How Tos]]
-[[Security Inspection Questions | Inspection Questions]] &nbsp;&ndash;+* [[Security Inspection Questions | Inspection Questions]]
-[[Security Methodologies | Methodologies]] &nbsp;&ndash;+* [[Security Methodologies | Methodologies]]
-[[Security Practices | Practices]] &nbsp;&ndash;+* [[Security Practices | Practices]]
-[[Security Principles | Principles]] &nbsp;&ndash;+* [[Security Principles | Principles]]
-[[Security Questions and Answers | Questions and Answers]] &nbsp;&ndash;+* [[Security Questions and Answers | Questions and Answers]]
-[[Security Techniques | Techniques]] &nbsp;&ndash;+* [[Security Techniques | Techniques]]
-[[Security Templates | Templates]] &nbsp;&ndash;+* [[Security Templates | Templates]]
-[[Security Walkthroughs | Walkthroughs]] &nbsp;&ndash;+* [[Security Walkthroughs | Walkthroughs]]
-[[Security Whiteboard Solutions | Whiteboard Solutions]]+* [[Security Whiteboard Solutions | Whiteboard Solutions]]
</div> </div>
|- |-
-! <h2 style="margin:0;background-color:#aaccff;font-family:sans-serif;font-size:140%;font-weight:bold;border:1px solid #a3b0bf;text-align:center;color:#000;padding:0.2em 0.4em;">Reference</h2>+! <h2 style="margin:0;font-variant:small-caps;font-weight:bold;text-align:center;#000:white;padding:0.2em 0.4em;">Reference</h2>
|- |-
|style="color:#000"|<div style="padding-left:1em"> |style="color:#000"|<div style="padding-left:1em">

Revision as of 20:12, 1 December 2007

Welcome to Security Guidance Share! This section features security specific guidance. Use security engineering to shape software security throughout the life cycle. Use threat modeling to help you identify your key security design issues. Use security design, code, and deployment inspections to implement proven practices. Use the software threats, attacks, vulnerabilities and countermeasures to understand security issues and apply appropriate defenses.


Focus Centers

Security Engineering - This section includes specific security techniques that help you meet your security objectives.


Security Inspections - This section focuses on performing design, code, and deployment inspections to improve software quality.


Threat Modeling - You can use threat modeling to shape your software's design to meet your security objectives, and reduce risk.


Threats and Countermeasures - This section focuses on threats, attacks, vulnerabilities and countermeasures.



Tech Centers

Knowledge Base

Reference



. . .

Personal tools