Practices for Secure Software Report
Table of Contents
Document Revision History
Version |
Date |
Author |
Comments |
1.0 |
[Date] |
[Your Name] |
Client
Instructions
Submit this completed practices for secure software report. Replace the bracketed text with the relevant information. You must document your process for writing secure communications and refactoring code that complies with software security testing protocols.
Respond to the steps outlined below and include your findings.
Respond using your own words. You may also choose to include images or supporting materials. If you include them, make certain to insert them in all the relevant locations in the document.
Refer to the Project Two Guidelines and Rubric for more detailed instructions about each section of the template.
Developer
[Insert your name here.]
Algorithm Cipher
[Insert text.]
Certificate Generation
Insert a screenshot below of the CER file.
[Insert screenshots here.]
Deploy Cipher
Insert a screenshot below of the checksum verification.
[Insert screenshots here.]
Secure Communications
Insert a screenshot below of the web browser that shows a secure webpage.
[Insert screenshots here.]
Secondary Testing
Insert screenshots below of the refactored code executed without errors and the dependency-check report.
[Insert screenshots here.]
Functional Testing
Insert a screenshot below of the refactored code executed without errors.
[Insert screenshots here.]
Summary
[Insert text.]
Industry Standard Best Practices
[Insert text.]