Executive Summary
Introduction
This document describes guidelines for secure code review in EDK II firmware.
Audience
This document is intended for use by firmware developers, security reviewers, and firmware validation engineers.
This document describes guidelines for secure code review in EDK II firmware.
This document is intended for use by firmware developers, security reviewers, and firmware validation engineers.