First published online August, 1996, last substantial edits 2000 Executive Summary Before programs may be placed in the firewall system, the source code is reviewed for deficiencies in the areas of security, reliability and operations. This document is dual purposed; first it is a guideline and checklist for security groups performing the code review; second, it is an attempt to provide developmen
{{#tags}}- {{label}}
{{/tags}}