Read Time:19 Second
Description
The product violates well-established principles for secure design.
This can introduce resultant weaknesses or make it easier for developers to introduce related weaknesses during implementation. Because code is centered around design, it can be resource-intensive to fix design problems.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
Consequences
Other: Other