Lines Matching refs:process

10 defined security process that helps developers build more secure
12 the key ideas of the security process and outlines which documents need
13 to be created. After the process is implemented and all supporting
20 We begin with an overview of the Zephyr development process, which
23 In subsequent sections, the individual parts of the process are treated
27 development process that ensures adherence to relevant coding
35 Finally, a process shall be defined for reporting, classifying,
43 .. figure:: media/security-process-steps.png
50 This document is a guideline for the development of a security process
52 Committee. It provides an overview of the Zephyr security process for
78 following process:
104 - **Quality Assurance** is driven by using a development process that
156 The Zephyr project uses an automated quality assurance process. The goal
157 is to have a process including mandatory code reviews, feature and issue
193 A security subcommittee has been formed to develop a security process in
194 more detail; this document is part of that process.
293 process needs to be authenticated first. Mechanisms to store
315 than one user or process shall not be shared if not strictly
346 system, each change shall follow a specified process including a
355 into the Zephyr development process. Further details on this are given
401 process and metrics such as cyclomatic complexity shall be
405 - **Automation:** the review process and checks for coding rule
409 in from subsystems, in addition to review process and coding rule
428 - **Release management** describes the process of defining the release
444 development process employed for the Zephyr project.
449 In order to obtain a certifiable system or product, the security process
451 and driven. This process includes the development of security related
459 The software security process includes:
471 process includes the validation of the effectiveness of
481 process for secure software and shall be automated wherever possible. On
484 guide the secure development process.
543 certification schemes. The first step of this process is the definition
555 In short, the threat modeling process can be separated into these steps
607 management process, and learnings shall be formulated as guidelines and
611 integrated into the continuous integration process.
620 claims are indeed fulfilled, so a general certification process is
622 certification scheme and evaluation level, this process needs to be
650 consistent documentation of the security development process,
654 contrast to these sections, the certification process only requires to