Skip to content

Commit 1257bdc

Browse files
dbkinderAnas Nashif
authored andcommitted
doc: add project security docs
While we're working on doc publishing that separates kernel docs that are release-specific from project docs that aren't, (temporarily) put the security documents here so they'll be published with the 1.9 release. Signed-off-by: David B. Kinder <[email protected]>
1 parent 0873540 commit 1257bdc

File tree

8 files changed

+839
-15
lines changed

8 files changed

+839
-15
lines changed

doc/contribute/contribute.rst

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,3 @@ patches for code, documentation, tests, and more, directly to the project.
1010
:maxdepth: 1
1111

1212
contribute_guidelines.rst
13-
security.rst

doc/index.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,7 @@ Sections
4646
api/api.rst
4747
samples/samples.rst
4848
reference/kconfig/index.rst
49+
security/security.rst
4950
contribute/contribute.rst
5051
release-notes.rst
5152
LICENSING.rst
58.8 KB
Loading
75.9 KB
Loading

doc/contribute/security.rst renamed to doc/security/secure-coding.rst

Lines changed: 3 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ help prevent security violations and limit their impact:
7979
protection scheme, e.g., after successful authentication.
8080
Furthermore, default settings for services shall be chosen in a way
8181
to provide maximum security. This corresponds to the "Secure by
82-
Default" paradigm [MICRO12]_.
82+
Default" paradigm [MS12]_.
8383

8484
- **Separation of privilege** is the principle that two conditions or
8585
more need to be satisfied before access is granted. In the context
@@ -108,13 +108,13 @@ specific to the development of a secure RTOS:
108108
threat mitigation approach. In case of the complementary security
109109
approach, parts of the threat mitigation are performed by the
110110
underlying platform. In case such mechanisms are not provided by the
111-
platform, or are not trusted, a defense in depth [MICRO12]_ paradigm
111+
platform, or are not trusted, a defense in depth [MS12]_ paradigm
112112
shall be used.
113113

114114
- **Less commonly used services off by default**: to reduce the
115115
exposure of the system to potential attacks, features or services
116116
shall not be enabled by default if they are only rarely used (a
117-
threshold of 80% is given in [MICRO12]_). For the Zephyr project, this can
117+
threshold of 80% is given in [MS12]_). For the Zephyr project, this can
118118
be realized using the configuration management. Each functionality
119119
and module shall be represented as a configuration option and needs
120120
to be explicitly enabled. Then, all features, protocols, and drivers
@@ -279,14 +279,3 @@ and approved by consensus.
279279
infrastructure being taken down.
280280
281281
.. _attack: http://www.theverge.com/2016/10/21/13362354/dyn-dns-ddos-attack-cause-outage-status-explained
282-
283-
.. [MICRO12] Microsoft Corporation, Security Development Lifecycle - SDL
284-
Process Guidance Version 5.2, 2012.
285-
286-
.. [PAUL09] M. Paul, "The Ten Best Practices for Secure Software
287-
Development," International Information Systems Security Certification
288-
Consortium, Inc. [(ISC)2], Palm Harbor, FL, USA, 2009.
289-
290-
.. [SALT75] J. H. Saltzer and M. D. Schroeder, "The protection of
291-
information in computer systems," Proceedings of the IEEE,
292-
vol. 63, no. 9, pp. 1278- 1308, Sep 1975.
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
:orphan:
2+
3+
.. _security-citations:
4+
5+
Security Document Citations
6+
###########################
7+
8+
.. [SALT75] J. H. Saltzer and M. D. Schroeder, "The protection of
9+
information in computer systems," Proceedings ofthe IEEE, vol. 63, no.
10+
9, pp. 1278-1308, Sep 1975.
11+
12+
.. [PAUL09] M. Paul, "The Ten Best Practices for Secure Software
13+
Development," International Information Systems Security Certification
14+
Consortium, Inc. [(ISC)2 |reg|], Palm Harbor, FL, USA, 2009.
15+
16+
.. [MS12] Microsoft Corporation, Security Development Lifecycle - SDL
17+
Process Guidance Version 5.2,2012.
18+
19+
.. [CCITSE12] Common Criteria for Information Technology Security
20+
Evaluation ver. 3.1 rev. 4, 2012.
21+
22+
.. [MICR16] Micrium, "Certification Kits," 2016. [Online]. Available:
23+
https://www.micrium.com/certification/certification-kits/.
24+
25+
.. [NIST02] National Institute of Standards and Technology, FIPS PUB 140-2:
26+
Security Requirements for COMPANY PUBLIC Application note Cryptographic
27+
Modules, Gaithersburg, 2002.
28+
29+
.. [GHS10] Green Hills Software, "INTEGRITY-178B Separation Kernel Security
30+
Target v4.2," 2010.

0 commit comments

Comments
 (0)