file.pdf (594.21 kB)
Download file

Supporting the Use of CERT® Secure Coding Standards in DoD Acquisitions

Download (594.21 kB)
posted on 01.10.2012, 00:00 by Timothy Morrow, Robert Seacord, John K. Bergey, Philip Miller

The United States Department of Defense (DoD) increasingly depends on networked software systems. One result of this dependency is an increase in attacks on both military and non-military systems as attackers look to exploit software vulnerabilities. Program acquisition offices are emphasizing information assurance to address various threats. The Defense Information Systems Agency (DISA) created the Application Security and Development Security Technical Implementation Guide (STIG) in response to DoD Directive 8500.IE, which establishes policies and assigns responsibilities for achieving DoD information assurance. That STIG provides guidance for information assurance and security throughout a program’s lifecycle, and it is specified as a requirement for DoD-developed, -architected, and -administered applications and systems that are connected to DoD networks.




Usage metrics