 
                            These guidelines are not designed for a specific system. However, files and file management are inherently tied to the underlying operating system. Cases or examples where security issues or recommendations are specific to an architecture are clearly marked as pertaining to that architecture.
Recommendations
FIO01-A. Access files through file descriptors versus file names
FIO02-A. Canonicalize file names originating from untrusted sources