====== Reference Standards ====== **Version:** 2.1\\ **Purpose:** External standards and regulations referenced by the checklists. ===== Standards ===== ^ Standard ^ Scope ^ Relevance ^ | ISO 27001 | Information Security Management | Audit logging, access control | | NIS2 | Critical Infrastructure Security | Security events, incident response | | CWE | Common Weakness Enumeration | Vulnerability classification | | OWASP | Web Application Security | Input validation, injection prevention | | GDPR | Data Protection | PII handling, logging restrictions | ===== CWE References ===== The security checklists reference specific CWE entries: ^ CWE ^ Name ^ Category ^ | CWE-20 | Input Validation | Input | | CWE-22 | Path Traversal | Input | | CWE-78 | Command Injection | Input | | CWE-79 | XSS | Output | | CWE-89 | SQL Injection | Input | | CWE-94 | Code Injection | Input | | CWE-190 | Integer Overflow | Arithmetic | | CWE-208 | Timing Attack | Crypto | | CWE-209 | Error Message Disclosure | Output | | CWE-294 | Replay Attack | Crypto | | CWE-300 | Channel Manipulation | Network | | CWE-316 | Memory Exposure | Memory | | CWE-323 | Nonce Reuse | Crypto | | CWE-330 | Weak RNG | Crypto | | CWE-352 | CSRF | Web | | CWE-362 | Race Condition | Concurrency | | CWE-384 | Session Fixation | Web | | CWE-400 | Resource Exhaustion | DoS | | CWE-434 | File Upload | Input | | CWE-476 | Null Pointer | Memory | | CWE-532 | Log Exposure | Logging | | CWE-601 | Open Redirect | Web | | CWE-667 | Lock Issues | Concurrency | | CWE-772 | Resource Leak | Memory | | CWE-833 | Deadlock | Concurrency | | CWE-862 | Missing Authorization | Access Control | ---- //Version: 2.1 (Split)//\\ //Author: Wolfgang van der Stille// ~~DISCUSSION:off~~