Guide for Project Managers ”  1 —and its key resource, the Build Security In (BSI) Web site—provide software project managers with sound practices that they can evaluate and selectively adopt to help reshape their own development practices. Software developed and assembled using these practices should contain significantly fewer exploitable weaknesses. Software is ubiquitous. Many of the products, services, and processes that organizations use and offer are highly dependent on software to handle the sensitive and high-value data on which people’s privacy, livelihoods, and very lives depend. National security relies on increasingly complex, interconnected, software-intensive information systems— systems that (in many cases) use the Internet or Internet-exposed private networks as their means for communicatio
To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.