Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Recommendations

SEC00-J. Follow the principle of least privilege

...

SEC12-J. Declare classes that derive from a sensitive class or implement a sensitive interface final

Rules

SEC30-J. Define wrappers around native methods

...

SEC35-J. Install security manager checks to protect sensitive operations

Risk Assessment Summary

Recommendations

Recommendation

Severity

Likelihood

Remediation Cost

Priority

Level

SEC00- J

high

probable

high

P6

L2

SEC01- J

medium

probable

high

P4

L3

SEC02- J

high

probable

medium

P12

L1

SEC03- J

high

probable

medium

P12

L1

SEC04- J

high

probable

medium

P12

L1

SEC05- J

medium

likely

medium

P12

L1

SEC06- J

medium

likely

medium

P12

L1

SEC06- J

medium

probable

high

P4

L3

SEC07- J

high

likely

high

P9

L2

SEC08- J

medium

probable

high

P4

L3

SEC09- J

medium

likely

high

P6

L2

SEC10- J

high

probable

low

P18

L1

Rules

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

SEC30- J

medium

probable

high

P4

L3

SEC31- J

medium

likely

high

P6

L2

SEC32- J

medium

likely

low

P18

L1

SEC33- J

high

probable

medium

P12

L1

SEC34- J

high

likely

low

P27

L1

...