"Bryan here. The security community has been buzzing since SANS and MITRE’s joint announcement earlier this month of their list of the Top 25 Most Dangerous Programming Errors. Now, I don’t want to get into a debate in this blog about whether this new list will become the new de facto standard for analyzing security vulnerabilities (or indeed, whether it already has become the new standard). Instead, I’d like to present an overview of how the Microsoft SDL maps to the CWE/SANS list, just like we did with the SDL/OWASP Top Ten mapping last May.
Michael and I have written up a detailed item-by-item analysis of the SDL coverage of the Top 25 and posted it on the microsoft.com Download Center. We believe that the results tend to endorse the validity of the SDL, given that the Top 25 were developed independently and the SDL does quite well at enabling us to root them out of the software we deliver. We encourage you to download the analysis white paper and make use of it in your own organization: we’ve published guidance around every manual process described in the paper, and we’ve also made many of the same SDL-required security tools that we use internally free for you to download and use as well."
Read more: http://blogs.msdn.com/sdl/archive/2009/01/27/sdl-and-the-cwe-sans-top-25.aspx