全网唯一标准王
文库搜索
切换导航
文件分类
频道
联系我们
问题反馈
文件分类
联系我们
问题反馈
批量下载
Managing Security Risks Inherent in the Use of Thirdparty Components b u c . 5 h t i g © 2017 SAFECode – All Rights Reserved. m o Managing Security Risks Inherent in the Use of Third-party Components Table of Contents 1 Introduction ......................................................................................................................................... 4 1.1 2 Challenges in Using Third-party Components................................................................................. 5 2.1 Example Use Case ......................................................................................................................... 5 2.2 What TPCs Are Included in a Product? .......................................................................................... 6 2.2.1 Naming of Components........................................................................................................... 7 2.2.2 Dependencies.......................................................................................................................... 7 2.3 3 Methodology and Scope ................................................................................................................. 4 2.3.1 Naming of Components........................................................................................................... 9 2.3.2 Dependencies.......................................................................................................................... 9 2.3.3 CVE Reports............................................................................................................................ 9 What TPCs Should We Use and What Are the Security Risks Associated with Them?................ 9 2.5 What Should We Do To Maintain the TPCs Within Our Product? ............................................... 10 b u Managing Third-party Components ................................................................................................ 11 3.2 h t i g Overview of the Third-party Component Management Life Cycle ............................................... 11 3.1.1 TPC Life Cycle and Software Development Life Cycle ......................................................... 12 Key Ingredients of a TPC Management Process ......................................................................... 14 3.2.1 Maintain List of TPCs (MAINTAIN)........................................................................................ 15 3.2.2 Assess Security Risk (ASSESS) ........................................................................................... 19 3.2.3 Mitigate or Accept Risk (MITIGATE) ..................................................................................... 22 3.2.4 Monitor for TPC Changes (MONITOR) ................................................................................. 23 3.3 5 c . 5 2.4 3.1 4 m o Is the Product Affected by the Vulnerable Third-party Component? .............................................. 8 Closing the Example Use Case .................................................................................................... 25 3.3.1 Selecting TPCs ...................................................................................................................... 25 3.3.2 Monitoring TPCs .................................................................................................................... 25 3.3.3 Responding to New Vulnerabilities........................................................................................ 25 3.3.4 Maintaining the TPCs in the Product ..................................................................................... 26 Future Considerations ...................................................................................................................... 27 4.1 Crowdsourcing of Naming and Name Mapping............................................................................ 27 4.2 Crowdsourcing of an End-of-life Repository ................................................................................. 27 4.3 Crowdsourcing of a Vulnerability Source Listing .......................................................................... 27 Summary ............................................................................................................................................ 28 5.1 Acknowledgements.....................................................
SAFECode 管理第三方组件安全风险 英文版 2017
文档预览
英文文档
32 页
50 下载
1000 浏览
0 评论
0 收藏
3.0分
赞助2元下载(无需注册)
温馨提示:本文档共32页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
下载文档到电脑,方便使用
赞助2元下载
本文档由 路人甲 于
2022-06-20 06:02:10
上传分享
举报
下载
原文档
(1.4 MB)
分享
友情链接
GB-T 42391-2023 铅酸蓄电池用电解液.pdf
GB-T 44552-2024 粒度分布的测定 气溶胶颗粒差分电迁移率分析法.pdf
ISO 9111 2024 Water reuse in urban areas Guidelines for benefit evaluation of reclaimed water use.pdf
GB-T 41936.2-2022 塑料 柔性材料扭转刚度的测定 第2部分 增塑氯乙烯均聚物和共聚物.pdf
GB-T 42636-2023 空间数据与信息传输系统 无损数据压缩.pdf
GB-T 20159.1-2006 环境条件分类 环境条件分类与环境试验之间的关系及转换指南 贮存.pdf
GB-T 3903.23-2008 鞋类 鞋跟和跟面试验方法 跟面结合力.pdf
GB-T 17625.7-2013 电磁兼容 限值 对额定电流≤75A且有条件接入的设备在公用低压供电系统中产生的电压变化、电压波动和闪烁的限制.pdf
GB-T 8457-2003 纺织机械 针织机 大公称直径圆机的针数.pdf
GB-T 6472-1996 立式内拉床 精度检验.pdf
GB-T 9799-2024 金属及其他无机覆盖层 钢铁上经过处理的锌电镀层.pdf
GB-T 18491.1-2001 信息技术 软件测量 功能规模测量 第1部分 概念定义.pdf
GB-Z 23740-2009 预防和降低食品中铅污染的操作规范.pdf
GB-T 34625-2017 金属及其他无机覆盖层 电气、电子和工程用金和金合金电镀层 技术规范和试验方法.pdf
GB-T 17262-2011 单端荧光灯 性能要求.pdf
GB-T 20469-2006 临床实验室设计总则.pdf
GB-T 32684-2016 塑料 酚醛树脂 游离甲醛含量的测定.pdf
GB 6969-2005 消防吸水胶管.pdf
GB-T 20521-2006 半导体器件 第14-1部分 半导体传感器-总则和分类.pdf
GB-T 44682-2024 液压传动 水液压泵测试方法.pdf
1
/
3
32
评价文档
赞助2元 点击下载(1.4 MB)
回到顶部
×
微信扫码支付
2
元 自动下载
官方客服微信:siduwenku
支付 完成后 如未跳转 点击这里 下载
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们
微信(点击查看客服)
,我们将及时删除相关资源。