Supporting the Use of CERT Secure Coding Standards in DoD Acquisitions
July 2012 • Technical Note
Timothy Morrow, Robert C. Seacord, John K. Bergey, Philip Miller
In this report, the authors provide guidance for helping DoD acquisition programs address software security in acquisitions.
Publisher:
Software Engineering Institute
CMU/SEI Report Number
CMU/SEI-2012-TN-016
DOI (Digital Object Identifier):
10.1184/R1/6584468.v1Abstract
The United States Department of Defense (DoD) increasingly depends on networked software systems. One result of this dependency is an increase in attacks on both military and non-military systems as attackers look to exploit software vulnerabilities. Program acquisition offices are emphasizing information assurance to address various threats. The Defense Information Systems Agency (DISA) created the Application Security and Development Security Technical Implementation Guide (STIG) in response to DoD Directive 8500.IE, which establishes policies and assigns responsibilities for achieving DoD information assurance. That STIG provides guidance for information assurance and security throughout a program’s lifecycle, and it is specified as a requirement for DoD-developed, -architected, and -administered applications and systems that are connected to DoD networks. This technical note provides guidance to help DoD acquisition programs address software security in acquisitions. It provides background on the development of secure coding standards, sample request for proposal (RFP) language, and a mapping of the Application Security and Development STIG to the CERT® C Secure Coding Standard.