安全架構設計必讀與參考材料
Secure Coding
https://www.securecoding.cert.org/confluence/display/seccode/SEI+CERT+Coding+Standards
http://cwe.mitre.org/data/published/cwe_v2.9.pdf
https://www.jssec.org/dl/android_securecoding_en.pdf
安全配置
https://benchmarks.cisecurity.org/downloads/
NIST Security
http://csrc.nist.gov/publications/PubsSPs.html
ETSI
http://www.etsi.org/technologies-clusters/technologies/security
http://www.etsi.org/images/files/ETSIWhitePapers/etsi_wp1_security-201506.pdf
CSA Cloud Security alliance
https://downloads.cloudsecurityalliance.org/assets/research/security-guidance/csaguide.v3.0.pdf
OWASP
https://www.owasp.org/index.php/OWASP_Cheat_Sheet_Series
https://www.owasp.org/images/9/9a/OWASP_Cheatsheets_Book.pdf
https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf
https://www.owasp.org/images/8/82/Esapi-design-patterns.pdf
德國電信
https://www.telekom.com/en/corporate-responsibility/data-protection—data-security/security
AWS Security
https://aws.amazon.com/whitepapers/#security
- Introduction to AWS Security Processes (June 2016) PDF
- Physical and operational security processes for network and infrastructure under AWS’ management.
- Overview of AWS Security – Analytics, Mobile, and Applications Services (June 2016) PDF
- Security aspects of Amazon EMR, Amazon Kinesis, AWS Data Pipeline, AWS IAM, Amazon CloudWatch, AWS CloudHSM, and more.
- Overview of AWS Security – Application Services (June 2016) PDF
- Security aspects of Amazon CloudSearch, Amazon SES, Amazon SNS, Amazon SQS, Amazon SWF, and more.
- Overview of AWS Security – Compute Services (June 2016) PDF
- Security aspects of the hypervisor usage, instance isolation, and auto scaling.
- Overview of AWS Security – Database Services (June 2016) PDF
- Security aspects of Amazon DynamoDB, Amazon RDS, encryption, and network isolation.
- Overview of AWS Security – Network Security (August 2016) PDF
- Security aspects of the network architecture, access points, transmission protection, and fault-tolerant design.
- Overview of AWS Security – Storage Services (June 2016) PDF
- Security aspects of storage, including data access, data transfer, durability, and access logs.
- Security at Scale: Governance in AWS (October 2015) PDF
- Using governance-enabling features to drive greater security.
- Security at Scale: Logging in AWS (October 2015) PDF
- Overview of common compliance requirements related to logging.
- Cross-Domain Solutions on AWS (December 2016) PDF
- Best practices for deploying a cross-domain solution using AWS services.
- Whitepaper on EU Data Protection (December 2016) PDF
- Meeting EU compliance requirements when using AWS services.
- Secure Content Delivery with Amazon Cloudfront (November 2016) PDF
- Maintaining security while using the Amazon CDN.
- AWS Key Management Service Cryptographic Details (August 2016) PDF
- Detailed description of cryptographic operations when using AWS Key Management Service.
- Introduction to Auditing the Use of AWS (October 2015) PDF
- Shared security model, tools, and appoaches for auditing security.
- Family Educational Rights and Privacy Act (FERPA) Compliance on AWS (May 2015) PDF
- Considerations when using AWS services in FERPA compliance environments.
- Single Sign-On: Integrating AWS, OpenLDAP, and Shibboleth (April 2015) PDF
- Integrating AWS IAM and LDAP for single sign-on solution.
- Architecting for Genomic Data Security and Compliance in AWS(December 2014) Executive Overview | PDF
- Working with controlled-access datasets for genomic research repositories.
- Using Windows Active Directory Federation Services (ADFS) for Single Sign-On to EC2 (March 2010) PDF
- Single sign-on for hybrid environment.