diff --git a/orange/follow-security-by-design-principles.md b/orange/follow-security-by-design-principles.md index 421d9b1..6eccd43 100644 --- a/orange/follow-security-by-design-principles.md +++ b/orange/follow-security-by-design-principles.md @@ -46,7 +46,7 @@ When implementing this principle: ## Further Readings - [Security design with principles](https://medium.com/ouspg/security-design-with-principles-a8c045765b93) -- [MITRE - Cyber Resiliency Design Principles](https://www.mitre.org/sites/default/files/publications/PR%2017-0103%20Cyber%20Resiliency%20Design%20Principles%20MTR17001.pdf) +- [MITRE - Cyber Resiliency Design Principles](https://www.mitre.org/news-insights/publication/cyber-resiliency-design-principles) - [Agile Modellgetriebene Entwicklung von Software Security & Privacy - page 14 (german)](https://se-rwth.de/phdtheses/Diss-Hermerschmidt-Agile-Modellgetriebene-Entwicklung-von-Software-Security-and-Privacy.pdf)
diff --git a/yellow/security-code-review.md b/yellow/security-code-review.md index abbe22b..5f00dbe 100644 --- a/yellow/security-code-review.md +++ b/yellow/security-code-review.md @@ -24,6 +24,6 @@ The following areas of code tend to have a high-risk of containing security vuln ## Further Readings -- Literature: [CWE Top 25 Most Dangerous Software Weaknesses](https://cwe.mitre.org/top25/archive/2020/2020_cwe_top25.html) +- Literature: [CWE Top 25 Most Dangerous Software Weaknesses](https://cwe.mitre.org/top25/index.html)