Programming Methodology Framework aka PMF Computer Incident Response Center Luxembourg
16, bd d'Avranches Luxembourg L-1611 Luxembourg +352 247 88444 alexandre.dulaunoy@circl.lu
Computer Incident Response Center Luxembourg
16, bd d'Avranches Luxembourg L-1611 Luxembourg +352 247 88444 andras.iklody@circl.lu
Security This document describes the Programming Methodology Framework also known under the PMF methodology. The methodology is based on the manifesto written by Zed A. Shaw which describes a natural approach to software engineering especially on the strong focus towards the act of programming. The PM methodology uses a soft naming to allow a non-partisan reference into official engineering or project documents to describe one of the most used software engineering methodology.
In 2011, Zed A. Shaw published a blog post which describes: I think I'm going to create the ultimate software development methodology. It'll be revolutionary compared to others because it will focus on the one thing that gets software done. Its entire focus will be this one, glorious, completely useful activity for writing software. It's name even embodies the perfection of this programming methodology. The programming methodology was published as a manifesto later . The manifesto clearly describes the focus on programming to avoid the surrounding management overhead and pivot towards the delivery of the software. The describes similar methodologies which strongly focus on coding, scripting and programming. The overall concept of PMF methodology follows this iteration: Write a list of things to be done and use an iterative programming process. Do some of the things with additional programming. Build testing and tests using programming. This process is run in a while loop until the software is delivered.
A simple management process is required in addition to the PMF methodology. The management process is complementary to the PMF metholody and not interfering with the programming aspect. The management process is there to support the PMF methodology. Review requirements of the users/customers by asking them. Give the list of things to be done to the programmers. Review the delivered software to see if it matches the requirements.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 .
Secure and defensive programming can only come by practicing programming and this also includes the act of simplifying or removing code to reduce the attack surface.
The authors wish to thank all the programmers who program.
Programming Motherfucker, do you speak it? The Tao of Programming