These guidelines are not designed for a specific system. However, files and file management are inherently tied to the underlying operating system. Cases or examples where security issues or recommendations are specific to an architecture are clearly marked as pertaining to that architecture.
FIO01-A. Access files through file descriptors versus file names
FIO02-A. Canonicalize file names originating from untrusted sources
FIO31-C. Detect and handle file operation errors