27.11.2014 Views

Software Security Engineering - Build Security In - US-CERT

Software Security Engineering - Build Security In - US-CERT

Software Security Engineering - Build Security In - US-CERT

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Requirements <strong>Engineering</strong> Practices 2<br />

Practices in<br />

Recommended<br />

Order Description Maturity Audience<br />

<strong>Security</strong><br />

requirements<br />

elicitation<br />

Conduct a security<br />

requirements elicitation<br />

activity to identify potential<br />

security requirements<br />

Relevant for<br />

These Roles<br />

L2 L • Lead requirements<br />

engineer<br />

• Stakeholders<br />

<strong>Security</strong><br />

requirements<br />

categorization and<br />

prioritization<br />

<strong>Security</strong><br />

requirements<br />

inspection<br />

Categorize and prioritize<br />

security requirements to<br />

separate true require-ments<br />

from architectural<br />

recommendations and to<br />

optimize cost–benefit<br />

considerations<br />

<strong>In</strong>spect security requirements<br />

in conjunction with<br />

other requirements to ensure<br />

they are correct and<br />

complete<br />

L2 L • Lead requirements<br />

engineer<br />

• Stakeholders<br />

L2 for<br />

security;<br />

L4 for<br />

inspections<br />

in<br />

general<br />

L<br />

• Lead requirements<br />

engineer<br />

Thursday, November<br />

06, 2008<br />

<strong>Software</strong> <strong>Security</strong> <strong>Engineering</strong><br />

Nancy R. Mead, October 16, 2008<br />

© 2008 Carnegie Mellon University<br />

41

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!