@@ -79,7 +79,7 @@ help prevent security violations and limit their impact:
79
79
protection scheme, e.g., after successful authentication.
80
80
Furthermore, default settings for services shall be chosen in a way
81
81
to provide maximum security. This corresponds to the "Secure by
82
- Default" paradigm [MICRO12 ]_.
82
+ Default" paradigm [MS12 ]_.
83
83
84
84
- **Separation of privilege ** is the principle that two conditions or
85
85
more need to be satisfied before access is granted. In the context
@@ -108,13 +108,13 @@ specific to the development of a secure RTOS:
108
108
threat mitigation approach. In case of the complementary security
109
109
approach, parts of the threat mitigation are performed by the
110
110
underlying platform. In case such mechanisms are not provided by the
111
- platform, or are not trusted, a defense in depth [MICRO12 ]_ paradigm
111
+ platform, or are not trusted, a defense in depth [MS12 ]_ paradigm
112
112
shall be used.
113
113
114
114
- **Less commonly used services off by default **: to reduce the
115
115
exposure of the system to potential attacks, features or services
116
116
shall not be enabled by default if they are only rarely used (a
117
- threshold of 80% is given in [MICRO12 ]_). For the Zephyr project, this can
117
+ threshold of 80% is given in [MS12 ]_). For the Zephyr project, this can
118
118
be realized using the configuration management. Each functionality
119
119
and module shall be represented as a configuration option and needs
120
120
to be explicitly enabled. Then, all features, protocols, and drivers
@@ -279,14 +279,3 @@ and approved by consensus.
279
279
infrastructure being taken down.
280
280
281
281
.. _attack : http://www.theverge.com/2016/10/21/13362354/dyn-dns-ddos-attack-cause-outage-status-explained
282
-
283
- .. [MICRO12 ] Microsoft Corporation, Security Development Lifecycle - SDL
284
- Process Guidance Version 5.2, 2012.
285
-
286
- .. [PAUL09 ] M. Paul, "The Ten Best Practices for Secure Software
287
- Development," International Information Systems Security Certification
288
- Consortium, Inc. [(ISC)2], Palm Harbor, FL, USA, 2009.
289
-
290
- .. [SALT75 ] J. H. Saltzer and M. D. Schroeder, "The protection of
291
- information in computer systems," Proceedings of the IEEE,
292
- vol. 63, no. 9, pp. 1278- 1308, Sep 1975.
0 commit comments