Download
| Alert*
Violation of Secure Design Principles
Description The product violates well-established principles for secure design. Extended DescriptionThis can introduce resultant weaknesses or make it easier for developers to introduce related weaknesses during implementation. Because code is centered around design, it can be resource-intensive to fix design problems. Applicable PlatformsNone Time Of Introduction
Common Consequences
Detection MethodsNone Potential MitigationsNone Relationships
Demonstrative ExamplesNone White Box Definitions None Black Box Definitions None Taxynomy MappingsNone References:
|