You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 84 Next »

These guidelines are not designed for a specific system. However, files and file management are inherently tied to the underlying operating system. Cases or examples where security issues or recommendations are specific to an architecture are clearly marked as pertaining to that architecture.

Recommendations

FIO01-A. Access files through file descriptors versus file names

FIO02-A. Canonicalize file names originating from untrusted sources

Rules

FIO31-C. Detect and handle file operation errors

  • No labels