Source Code Analysis Laboratory (SCALe) for Energy ... - CERT
Source Code Analysis Laboratory (SCALe) for Energy ... - CERT
Source Code Analysis Laboratory (SCALe) for Energy ... - CERT
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Figure 6: <strong>CERT</strong> <strong>SCALe</strong> Seal<br />
Except <strong>for</strong> patches that meet the criteria below, any modification of software after it is designated<br />
as con<strong>for</strong>ming voids the con<strong>for</strong>mance designation. Until such software is retested and determined<br />
to be con<strong>for</strong>ming, the new software cannot be associated with the <strong>CERT</strong> <strong>SCALe</strong> seal.<br />
Patches that meet all three of the following criteria do not void the con<strong>for</strong>mance designation:<br />
• The patch is necessary to fix a vulnerability in the code or is necessary <strong>for</strong> the maintenance<br />
of the software.<br />
• The patch does not introduce new features or functionality.<br />
• The patch does not introduce a violation of any of the rules in the secure coding standard to<br />
which the software has been determined to con<strong>for</strong>m.<br />
Use of the <strong>CERT</strong> <strong>SCALe</strong> seal is contingent upon the organization entering into a service agreement<br />
with Carnegie Mellon University and upon the software being designated by <strong>CERT</strong> as con<strong>for</strong>ming.<br />
3.3 <strong>CERT</strong> <strong>SCALe</strong> Service Agreement<br />
Organizations seeking <strong>SCALe</strong> con<strong>for</strong>mance testing will abide by the <strong>SCALe</strong> policies and procedures<br />
required by the <strong>SCALe</strong> Service Agreement. Organizations submitting software code <strong>for</strong><br />
con<strong>for</strong>mance testing will follow these basic processes:<br />
1. A service agreement must be fully executed by the organization and Carnegie Mellon University’s<br />
Software Engineering Institute be<strong>for</strong>e con<strong>for</strong>mance testing begins.<br />
2. <strong>CERT</strong> evaluates the source code of the software against the identified <strong>CERT</strong> secure coding<br />
standard(s), specified in the statement of work, using the identified tools and procedures and<br />
provides an initial con<strong>for</strong>mance test report to the client that catalogues all rule violations<br />
found as a result of the <strong>SCALe</strong> evaluation.<br />
3. From receipt of the initial con<strong>for</strong>mance test report, the client has 180 days to repair noncon<strong>for</strong>ming<br />
code and/or prepare documentation that supports the conclusion that identified violations<br />
do not present known vulnerabilities and resubmit the software and any deviation<br />
requests <strong>for</strong> a final evaluation of the software against the specified <strong>CERT</strong> secure coding<br />
standard(s).<br />
CMU/SEI-2010-TR-021 | 30