
...
Note that this rule makes no assumptions about the integrity of the data being sent down a socket. For information about securiting data integrity, see SER02-J. Sign and then seal sensitive objects before sending them outside a trust boundary.
...
- The data being sent over the socket is not sensitive
- The data is sensitive, but properly encrypted. See SER02-J. Sign and then seal sensitive objects before sending them outside a trust boundary for more information.
- The network path of the socket never crosses a trust boundary. This could happen if, for example, the two endpoings of the socket are within a local network and the entire network is trusted.
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="ac98ca4e865617d4-d8875723-4805451b-99eb803d-bc476954899f7419c28296e2"><ac:plain-text-body><![CDATA[ | [[API 2006 | AA. Bibliography#API 06]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="2b974ab7c4d01e9b-1ba04dd2-4ef74c6f-b9f2a3d5-82a584540bab1b901891a9cc"><ac:plain-text-body><![CDATA[ | [[Gong 2003 | AA. Bibliography#Gong 03]] | 11.3.3 "Securing RMI Communications" | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="0568fe093555e468-3c83246a-472744e6-a843969c-a343d81081b29104a5e5e131"><ac:plain-text-body><![CDATA[ | [[Ware 2008 | AA. Bibliography#Ware 08]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
...