From Guidance Share

(Difference between revisions)
Jump to: navigation, search
Revision as of 05:12, 25 March 2007 (edit)
Admin (Talk | contribs)

← Previous diff
Revision as of 05:12, 25 March 2007 (edit)
Admin (Talk | contribs)

Next diff →
Line 74: Line 74:
|- |-
-! <h2 style="margin:0;background-color:#aaccff;font-family:sans-serif;font-size:140%;font-weight:bold;border:1px solid #a3b0bf;text-align:center;color:#000;padding:0.2em 0.4em;">Resources</h2>+! <h2 style="margin:0;background-color:#aaccff;font-family:sans-serif;font-size:140%;font-weight:bold;border:1px solid #a3b0bf;text-align:center;color:#000;padding:0.2em 0.4em;">Reference</h2>
|- |-
|style="color:#000"|<div style="padding-left:1em"> |style="color:#000"|<div style="padding-left:1em">

Revision as of 05:12, 25 March 2007

Welcome to Security Guidance Share! This section features security specific guidance. Use security engineering to shape software security throughout the life cycle. Use threat modeling to help you identify your key security design issues. Use security design, code, and deployment inspections to implement proven practices. Use the software threats, attacks, vulnerabilities and countermeasures to understand security issues and apply appropriate defenses.

Focus Centers

Threats and Countermeasures - This section focuses on threats, attacks, vulnerabilities and countermeasures.

Security Engineering - This section includes specific security techniques that help you meet your security objectives.

Security Inspections - This section focuses on performing design, code, and deployment inspections to improve software quality.

Threat Modeling - You can use threat modeling to shape your software's design to meet your security objectives, and reduce risk.

Tech Centers

Knowledge Base


. . .

Personal tools