Security Practices

From Guidance Share

(Difference between revisions)
Jump to: navigation, search
Revision as of 04:20, 26 November 2006 (edit)
Admin (Talk | contribs)

← Previous diff
Current revision (04:21, 26 November 2006) (edit)
Admin (Talk | contribs)

 
Line 1: Line 1:
-Checklist items present a verification to perform ("what to check for", "how to check" and "how to fix").+You can use Security Practices guidance modules to support the key security activities. Security Practices are proven and emerging practices expressed as precisely as possible. Each practice is presented using a problem and solution format and the set of practices are organized using pattern-based categories.
{| style="width:100%" border="0" {| style="width:100%" border="0"
Line 5: Line 5:
| |
=== .NET Framework 2.0 === === .NET Framework 2.0 ===
-* [[.NET Framework 2.0 Security Checklists]]+*
-* [[ADO.NET 2.0 Security Checklists]]+*
-* [[ASP.NET 2.0 Security Checklists]]+
|| ||
=== .NET Framework 1.1 === === .NET Framework 1.1 ===
-* [[.NET Framework 1.1 Security Checklist]]+*
-* [[ADO.NET 1.1 Security Checklist]]+*
-* [[ASP.NET 1.1 Security Checklist]]+
-* [[Code Access Security (.NET 1.1) Security Checklist]]+
-* [[Enterprise Services (.NET 1.1) Security Checklist]]+
-* [[Remoting (.NET 1.1) Security Checklist]]+
-* [[Web Services (ASMX 1.1) Security Checklist]]+
- 
-=== IIS === 
-* [[IIS 5/5.1 Security Checklist]] 
- 
- 
-=== Network === 
-* [[Network Security Checklist]] 
|- |-

Current revision

You can use Security Practices guidance modules to support the key security activities. Security Practices are proven and emerging practices expressed as precisely as possible. Each practice is presented using a problem and solution format and the set of practices are organized using pattern-based categories.

.NET Framework 2.0


.NET Framework 1.1




Personal tools