...
Applications should also maintain their files in secure directories, when possible, where they can only be accessed by the owner of the file and (possibly) by a system administrator.
Non-Compliant Code Example (device / i-node)
This The following non-compliant code example opens and closes a file multiple times. It relies solely on the file name to identify the file.
...