Are you interested in learning about and identifying security gaps in your project or just learning more about software security to improve development practices? This introductory guide is a good place to begin.
Resource information | Details |
---|---|
Article Title | Guide to Securing Scientific Software |
Authors | Elisa R. Heymann, Barton P. Miller, Andrew Adams, Kay Avila, Mark Krenz, Jason R. Lee, and Sean Peisert |
Focus | Security of Scientific Software |
The Guide to Securing Scientific Software, a living document, is published by Trusted: CI, the NSF Cybersecurity Center of Excellence, to help scientific software developers understand and ameliorate possible security gaps in scientific software and for those leading projects to understand what resources may be required to improve scientific software security.
The guide is an introduction to topics for secure software development including referenced resources for each topic for deeper dives. It describes possible threats and presents best practices for secure software development for the scientific community. The guide has been designed to be a tutorial, used as a whole, or as a guide to a particular topic of interest. Many of the topics point to video lessons on the Trusted CI website.