Rules
| Content by Label | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Risk Assessment Summary
Rule | Severity | Likelihood | Detectable | Repairable |
|---|
Guidelines
ENV00-J. Do not sign code that performs only unprivileged operations
ENV07-J. Do not deploy an application that can be accessed by the JVM Tool Interface
ENV03-J. Limit remote uses of JVM Monitoring and Managing
ENV01-J. Place all privileged code in a single package and seal the package
ENV02-J. Create a secure sandbox using a Security Manager
ENV03-J. Never grant AllPermission to untrusted code
ENV04-J. Do not grant ReflectPermission with target suppressAccessChecks
ENV05-J. Do not grant RuntimePermission with target createClassLoader
ENV34-J. Do not disable bytecode verification
ENV35-J. Provide a trusted environment and sanitize all inputs
Risk Assessment Summary
Recommendations
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level | |
|---|---|---|---|---|---|---|
| ENV00-J | High | Probable high | probable No | medium No | P12 P6 | L1 L2 |
| ENV01-J | High | low Probable | unlikely No | medium No | P2 P6 | L3 L2 |
| ENV02-J | Low | Likely high | probable Yes | medium No | P12 P6 | L1 L2 |
| ENV03-J | High | high Likely | probable No | low No | P18 P9 | L1 L2 |
| ENV04-J | high High | probable Likely | medium No | P12 No | L1 P9 |
Rules
L2 | |||||
| ENV05 | |||||
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
| ENV30-J | high High | probable Probable | low No | P18 No | L1 P6 |
ENV31- J | high | likely | low | P27 | L1 |
L2 | |||||
| ENV06 ENV32-J | high High | probable Probable | low No | P18 No | L1 P6 |
ENV33- J | high | probable | low | P18 | L1 |
ENV34- J | high | likely | low | P27 | L1 |
ENV35- J | high | probable | medium | P12 | L1 |
L2 |
...
00. Introduction The CERT Sun Microsystems Secure Coding Standard for Java