CWE TM COMPATIBILITY ENFORCEMENT

Similar documents
Optum Anesthesia. Completely integrated anesthesia information management system

The future of patient care. 6 ways workflow automation will transform the healthcare experience

Safe Harbor Vs the Statistical Method

Outsourcing Non-core Activities A strategy for SMBs that actually works

New Ways of Working - How Cross-Boundary Collaboration is Transforming Business

Nurse Call Communication System

SEVEN SEVEN. Credentialing tips designed to help keep costs down and ensure a healthier bottom line.

SNOMED CT AND 3M HDD: THE SUCCESSFUL IMPLEMENTATION STRATEGY

Real-Time Locating System Based on Bluetooth Low Energy and Cloud Technologies. Duress Alarm Patient Wandering Hands-free Access Control

TrakCare Overview. Core Within TrakCare. TrakCare Foundations

Agile Development of Shared Situational Awareness: Two Case Studies in the U.S. Air Force and Army

network workflow Case studies on how two Canadian universities are leading the way in reusing academic data. increasing research productivity

Exploring the Possibilities with MIDAS+ SmartConnect

ebook 6Six Steps to Developing a Successful Clinical Smartphone Strategy

Healthcare mobile communication solution:

Wolf EMR. Enhanced Patient Care with Electronic Medical Record.

LotusLive. Working together just got easier Online collaboration solutions for the working world

For some years, the automation of hospital administrative

Military medics save lives in the field, and now get some

Studying Software Vulnerabilities

HEAD TO HEAD. Bug Bounties vs. Penetration Testing. How the crowdsourced model is disrupting traditional penetration testing.

Cognitive Triangle. Dec The Overall classification of this Briefing is UNCLASSIFIED

Alaris System. Medication safety system focused at the point of care

ONESOURCE University Training with Session Descriptions

Technical Charter (the Charter ) for. ONAP Project a Series of LF Projects, LLC

Lab Quality Confab Process Improvement Institute. New Orleans, LA. John Waugh 11/3/2015

PLANNING DRILLS FOR HEALTHCARE EMERGENCY AND INCIDENT PREPAREDNESS AND TRAINING

Texas ACO invests in the Quanum portfolio to improve patient care

The Cost of a Misfiled Medical Document

Streamlined access to vital patient information. InnovIan SolutIon SuIte

Successful disease management requires technology that can measure progress, show gaps

Oracle Taleo Cloud for Midsize (TBE)

The Concept of C2 Communication and Information Support

Introducing a new class of fire detection

Integrated Offshore Outsourcing Solution

Joint Staff J7 / Deputy Director for Joint Training

January 2017 A GUIDE TO HOME HEALTH VALUE-BASED PURCHASING

ONESOURCE TRANSFER PRICING. Worldwide Comparable Company Data

Alaris Products. Protecting patients at the point of care

SPOK MESSENGER. Improving Staff Efficiency and Patient Care With Timely Communications and Critical Connectivity

Implementation of Automated Knowledge-based Classification of Nursing Care Categories

Project Overview for the Technical Compliance Monitoring System

VA Compensation and Pension Capstone

Driving Business Value for Healthcare Through Unified Communications

March 14, pm ET

The birth of a new era Excellent neonatal respiratory support at your fingertips DRÄGER BABYLOG VN500

MorCare Infection Prevention prevent hospital-acquired infections proactively

County of Alpena Website Design and Development RFP

Seamless Clinical Data Integration

ecardio Cardiology Suite

Hilton Reservations and Customer Care

onesourcetm trust & estate administration tax & accounting

Operational Procedures for the Organization and Management of the S-100 Geospatial Information Registry

WisTAF Grants Management System Recommendation D. Tomlinson September, 2016

SNOMED CT AND ICD-10-BE: TWO OF A KIND?

CGI e-carelogic. enhancing care across the health economy. Connected healthcare from CGI

HealthMatics ED Emergency Department Information System

Operational Procedures for the Organization and Management of the S-100 Geospatial Information Registry

RFID-based Hospital Real-time Patient Management System. Abstract. In a health care context, the use RFID (Radio Frequency

Department of Defense Investment Review Board and Investment Management Process for Defense Business Systems

DoD Annex for Protection Profile for Application Software v1.0 Version 1, Release October 2014

Data Sharing Consent/Privacy Practice Summary

AFCEA Mission Command Industry Engagement Symposium

EVERGREEN IV: STRATEGIC NEEDS

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

3M Sterilization Assurance Standards Practice. In Sterilization with the Core Four

Component Description Unit Topics 1. Introduction to Healthcare and Public Health in the U.S. 2. The Culture of Healthcare

Why Isn t Someone Coding Yet (WISCY)? Avoiding Ineffective Requirements

Rethinking Payroll Performance

Tunstall telehealth solutions

Jumpstarting population health management

bd.com Pyxis Enterprise Server

NCDPI Licensure Review

End-to-end infusion safety. Safely manage infusions from order to administration

Clinical Development Process 2017

RTLS and the Built Environment by Nelson E. Lee 10 December 2010

At your side in intensive care

Centricity Perinatal C C C A D

A Multi-Phased Approach to Using Clinical Data to Drive Evidence-Based EMR Redesign. Kulik, Carole Marie; Foad, Wendy; Brown, Gretchen

Customer Success Story

MT Streamlined access to vital patient information INNOVIAN SOLUTION SUITE

Increasing security and convenience at Epic health systems

WHITE PAPER. Maximizing Pay-for-Performance Opportunities Proven Steps to Making P4P a Proactive, Successful and Sustainable Part of Your Practice

United Kingdom National Release Centre and Implementation of SNOMED CT

Healthcare Solutions Nuance Clintegrity Quality Management Solutions. Quality. The Discipline to Win.

HELPS COMPANIES Hire Talent Faster at Lower Costs HELPS JOB SEEKERS. Easy Implementation. Immediate Value Delivery

WHITE PAPER. Transforming the Healthcare Organization through Process Improvement

Moving from Sentinel SuperPro to Sentinel LDK Migration Guide

RAS What s New for Grants?

Test and Evaluation of Highly Complex Systems

CarePlus Child Health. An all-embracing interactive child health record, from child to adult

D Bringing you closer to your patients PATIENT MONITORING AND IT SOLUTIONS

EDUCATE. EMPOWER. TRANSFORM.

Atos Global FinTech program: A catalyst for innovation in Financial Services

Defense Travel Management Office

Fully Featured Safe and Secure eprescribing from PatientSource. Patient Care Safely in One Place

The Evolution of the Conference Room and the Technology Behind it

Patient Safety Reporting System for Nursing Homes Patient Safety Authority Commonwealth of Pennsylvania. Government to Business (G to B)

Digistat Patient Watch

The creative sourcing solution that finds, tracks, and manages talent to keep you ahead of the game.

Transcription:

CWE TM COMPATIBILITY ENFORCEMENT AUTOMATED SOURCE CODE ANALYSIS TO ENFORCE CWE COMPATIBILITY STREAMLINE CWE COMPATIBILITY ENFORCEMENT The Common Weakness Enumeration (CWE) compatibility enforcement module reports on dataflow problems, software defects, language implementation errors, inconsistencies and dangerous usage for C source code quickly and efficiently. The CWE C enforcement module is an optional add-on for the QA C static analysis solution, providing a mapping of QA C checks to CWE identifiers to ensure vulnerabilities including security related defects and violations are detected. The CWE C enforcement module provides an extension to the analysis and reporting capabilities of QA C to directly highlight known software vulnerabilities listed in the CW repository, and combines error detection and security best practice with full integration within the PRQA product suite. The CWE C compatibility enforcement module provides an out-of-the-box configuration for QA C, which eliminates the need to manually configure the tool to enforce CWE compatibility, and includes additional checks to supplement the already extensive suite of QA C analysis checks. The existing QA C report templates are also enhanced to allow generation of reports that specifically show the compatibility of a code base to the CWE database, to inform internal stakeholders or to use for audit purposes. IDENTIFIES WHAT THE PROBLEM IS, EXPLAINS WHY IT S A PROBLEM AND SHOWS HOW TO FIX IT The QA C static analyzer automatically performs in-depth analyses on your source code without executing programs. It checks your software for security vulnerabilities as described by CWE and can be configured to run locally on either desktop or server. QA C identi- fies issues which compilers and most developers miss. These include lesser-known issues explicitly stated in the ISO standards and language constructs that, while not classified as incorrect, may result in unpredictable behavior. Unlike bug catchers or less sophisticated static analyzers QA C finds more issues while producing fewer false positives and negatives. BENEFITS Automatically track, report and demonstrate CWE Compatibility. Continuously inspect source code for vulnerabilities in the CWE database Scale to millions of lines of code Increase code portability and re-usability Give your developers contextual feedback that helps them correct and learn from mistakes Reduce bottlenecks caused by manual code review and slow analysis tools and Correlated Rule Help methods Analyze your source code without executing programs Extended Message Help 2017 PROGRAMMING RESEARCH LTD www.qa-systems.com

DON T JUST FIND BUGS - ENABLE BEST PRACTICE CWE is a unified repository of known software weaknesses that have been shown to result in vulnerabilities that could be exploited. CWE, developed by the MITRE Corporation which is sponsored by US-CERT in the office of Cybersecurity and Communications at the U.S. Department of Homeland Security, provides a standard language for describing software security weaknesses. The standardization of terminology makes it easier for organizations to identify, understand and eliminate the countless security weaknesses that can occur in software. CWE is communitydeveloped by a diverse, international set of experts from business, academic sources, software suppliers and government agencies, ensuring breadth and depth of content. The CWE enumerates design and architectural weaknesses, as well as low-level coding and design errors. It is not a coding standard but instead is a knowledge base of recognized software defects that are examples of insecure coding practices that should be avoided For developers who lack security training, identifying security problems during a code review can be difficult, if not impossible. Security mistakes can be subtle and easy to overlook even for trained developers. The CWE C compatibility enforcement module plays a significant role in improving security and improving development practices. The use of this module can make the code review process faster and more effective by uncovering security related weaknesses and narrowing the set of potential problems for consideration during a code review. KEY FEATURES ADVANCED DEFECT PREVENTION Using a proprietary, high-performance C language parser combined with a Deep Flow Dataflow analysis engine, QAC is able to build an accurate model of the behavior of the software and track the value of variables in the code as they would be at run time. This sophisticated analysis approach maximizes code coverage while minimizing false positives and false negatives and allows QAC to detect critical defects not reported by compilers or other tools and recognize issues caused by dangerous, overly complex and non-portable language usage. Identify unpredictable behaviours others miss ACTIONABLE RESULTS TO COMPLY TO THE CWE STANDARD The CWE C module clearly identifies must-fix defects and includes a comprehensive knowledge base help system that provides detailed guidance with examples to support developers in fixing the issues found in the source code. Because developers get immediate and contextual feedback within their development environment, they can make the required changes as they are creating new code or reviewing existing code. In this way, developers build aware- ness of best practice approaches and can quickly form coding habits that are aligned with your organization s expectations. Clearly identify errors without executing code www.qa systems.com / www.qa systems.de 2

MONITOR AND CONTINUALLY IMPROVE YOUR CODEBASE WITH CONFIGURABLE REPORTS The compatibility report helps you visualize which areas of your codebase require the most attention to reach a higher level compatibility. The code review report refocuses peer review on discussing design, optimization, and meeting requirements rather than costly manual investigation of code conformance and correctness. The suppression report provides information on message diagnostics that have been suppressed during analysis Visualize what parts of the code need the most attention ANALYSIS OF INDUSTRIAL-SCALE CODE Automated static analysis using QAC assists in identifying defects, vulnerabilities, and compatibility issues early in the development cycle where they can be fixed faster and at lower cost. QAC is fast, non-disruptive, easy-to-use, and scales to any size of development environment. As a result, organizations whose products need to perform securely and reliably in mission critical and safety critical environments trust in QAC to help lower the risk of software failures, improve quality and reduce time-to-market. The CWE C compliance module can ensure rapid and granular analysis of potential security issues both early in a development cycle and in established code streams by automatically detecting, reporting and providing context rich guidance on how to ensure security vulnerabilities are identified early makes it easier and more cost effective to fix. EASY TO LEARN AND EASY TO USE The CWE C module functions as a plug-in within QAC s powerful GUI and delivers a contextual drill-down environment linked to a deep knowledge base. QAC explains why problems it discovers need to be corrected and then provides guidance to help in fixing them. ADAPTABLE TO FIT EXISTING DEVELOPMENT ENVIRONMENTS The CWE C module plugs into QAC and is easily integrated into existing build systems and continuous integration environments to provide a means to enhance early and often testing with automated code analysis that helps to avoid errors that are expensive to fix late in the development cycle. This allows existing code review processes to be accelerated and refocused, thereby helping to increase overall productivity while also improving quality and security of the software. Additionally, the CWE C module and QAC can be configured for incremental analysis to ensure that only new changes are analyzed and feedback can be provided quickly. ROBUST AND FLEXIBLE CODING STANDARD ENFORCEMENT The CWE C module is based on the CWE online repository, to automate compatibility checks for the CWE weaknesses and the generation of the reports and audit documentation required to demonstrate compatibility. QAC functionality also allows messages to be suppressed at targeted source code locations and these suppressions can be included in deviation reports when required for audit to a specific standard. www.qa systems.com / www.qa systems.de 3

KEY CHECKS The CWE C compatibility module helps to avoid constructs in the C language that can lead to product failures, functional safety issues and vulnerabilities that attackers can exploit and also reduce code reusability. The compatibility module applies the extensive QAC message set supplemented by some additional CWE-specific checks to highlight weaknesses associated with the CWE identifiers. Documentation is provided describing rule enforcement and message interpretation, and an extensive set of example code is included to aid understanding. The categories of vulnerabilities and weakness include: Boundary checks Resource leak checks Memory safety checks Dead code checks Uninitialized/unused variables checks Race conditions / synchronization checks Human coding errors TECHNICAL SPECIFICATIONS GENERAL FEATURES Command line interface (CLI) Interactive GUI with message browser Online help & knowledge base - Usage & implementation contextual message - C language - CWE compatibility Summary & detailed reports IDE integrations CODE ANALYSIS FEATURES 1,700+ selectable messages C language-specific parsing engine Parses code of any size & complexity Handles common language extensions Cross module analysis (link time checking) Semantic error detection Dataflow error detection Close name analysis MESSAGE OUTPUT CONTROL Comment based suppression Baselining RESULTS OUTPUT Configurable HTML reports Standard report types - Compliance - Code review - Suppression - Metric data CODING STANDARD ENFORCEMENT Identifies 120 CWE weaknesses, categories and compound elements CWE search - Users can search security elements using CWE identifiers CWE output - Security elements presented to users include, or enables users to obtain, associated CWE identifiers CWE documentation - Documentation describes CWE, CWE compatibility, and how CWE-related functionality is used Rule subsets for legacy code Best practice issues Naming convention checker Layout checker Defensive programming - defect avoidance Extensible rule base Customizable message text Deviation support www.qa systems.com / www.qa systems.de 4

QA Systems and Programming Research Ltd QA Systems is an authorised reseller of the QAC / QAC++, QAVerify static testing tools and their compliance module add-ons, which are owned by Programming Research Ltd. QAC, QAC++ and QAVerify are registered trademarks of Programming Research Ltd. These tools and this document are the copyright 2016 of Programming Research Ltd. Third party trademarks, logos and trade names appearing in this document are the trademarks and property of their respective owners. QAC, QAC++ and QAVerify, offer the closest possible examination of C and C++ code. All contain powerful, proprietary parsing engines combined with deep accurate dataflow which deliver high fidelity language analysis and comprehension. They identify problems caused by language usage that is dangerous, overly complex, non-portable or difficult to maintain. Plus, they provide a mechanism for coding standard enforcement. Contact Us For further information regarding QAC, QAC++ and QAVerify and compliance module add-ons, please contact QA Systems at info@qa-systems.de. www.qa systems.com / www.qa systems.de 5