Rules
| Content by Label | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Risk Assessment Summary
Rule | Severity | Likelihood | Detectable | Repairable | Priority | Level |
|---|---|---|---|---|---|---|
| ENV00-J | High | Probable | No | No | P6 | L2 |
| ENV01-J | High | Probable | No | No | P6 | L2 |
| ENV02-J | Low | Likely | Yes | No | P6 | L2 |
| ENV03-J | High | Likely | No | No | P9 | L2 |
| ENV04-J | High | Likely | No | No | P9 | L2 |
| ENV05-J | High | Probable | No | No | P6 | L2 |
| ENV06-J | High | Probable | No | No | P6 | L2 |
...
Recommendations
ENV00-J. Do not sign code that performs only unprivileged operations
ENV01-J. Do not deploy an application that can be accessed by the JVM Tool Interface
ENV03-J. Limit remote uses of JVM Monitoring and Managing
Rules
ENV30-J. Create a secure sandbox using a Security Manager
ENV31-J. Never grant AllPermission to untrusted code
ENV32-J. Do not grant ReflectPermission with target suppressAccessChecks
ENV33-J. Do not grant RuntimePermission with target createClassLoader
ENV34-J. Do not disable bytecode verification
ENV35-J. Provide a trusted environment and sanitize all inputs
Risk Assessment Summary
Recommendations
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|
Rules
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|
The CERT Sun Microsystems Secure Coding Standard for Java The CERT Sun Microsystems Secure Coding Standard for Java