Practices for Secure Software Report

Table of Contents

Document Revision History

Version

Date

Author

Comments

1.0

[Date]

[Your Name]

Client

Instructions

Submit this completed practices for secure software report. Replace the bracketed text with the relevant information. You must document your process for writing secure communications and refactoring code that complies with software security testing protocols.

Respond to the steps outlined below and include your findings.

Respond using your own words. You may also choose to include images or supporting materials. If you include them, make certain to insert them in all the relevant locations in the document.

Refer to the Project Two Guidelines and Rubric for more detailed instructions about each section of the template.

Developer

[Insert your name here.]

Algorithm Cipher

[Insert text.]

Certificate Generation

Insert a screenshot below of the CER file.

[Insert screenshots here.]

Deploy Cipher

Insert a screenshot below of the checksum verification.

[Insert screenshots here.]

Secure Communications

Insert a screenshot below of the web browser that shows a secure webpage.

[Insert screenshots here.]

Secondary Testing

Insert screenshots below of the refactored code executed without errors and the dependency-check report.

[Insert screenshots here.]

Functional Testing

Insert a screenshot below of the refactored code executed without errors.

[Insert screenshots here.]

Summary

[Insert text.]

Industry Standard Best Practices

[Insert text.]