09.02.2015 Views

ISO/IEC 21827

ISO/IEC 21827

ISO/IEC 21827

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>ISO</strong>/<strong>IEC</strong> <strong>21827</strong>:2002(E)<br />

7.10.1.3 Base Practice List<br />

BP.10.01<br />

BP.10.02<br />

BP.10.03<br />

BP.10.04<br />

BP.10.05<br />

BP.10.06<br />

BP.10.07<br />

Gain an understanding of the customer's security needs.<br />

Identify the laws, policies, standards, external influences and constraints that govern the<br />

system.<br />

Identify the purpose of the system in order to determine the security context.<br />

Capture a high-level security oriented view of the system operation.<br />

Capture high-level goals that define the security of the system.<br />

Define a consistent set of statements which define the protection to be implemented in the<br />

system.<br />

Obtain agreement that the specified security requirements match the customer's needs.<br />

7.10.1.4 Process Area Notes<br />

This process area covers the activities defining all aspects of security in the entire information system (e.g., physical,<br />

functional, procedural). The base practices address how the security needs are identified and refined into a coherent<br />

baseline of security-related requirements which used in the design, development, verification, operation, and<br />

maintenance of the system. In most cases it is necessary to take into account the existing environment and associated<br />

security needs. The information gained and produced by this process area is collected, further refined, used, and<br />

updated throughout a project (particularly in Provide Security Input (PA02)), in order to ensure customer needs are<br />

being addressed.<br />

7.10.2 BP.10.01 - Gain Understanding of Customer's Security Needs<br />

Gain an understanding of the customer's security needs.<br />

7.10.2.1 Description<br />

The purpose of this base practice is to collect all information necessary for a comprehensive understanding of the<br />

customer's security needs. These needs are influenced by the importance to the customer of security risk. The target<br />

environment in which the system is intended to operate also influences the customer's needs with regard to security.<br />

7.10.2.2 Example Work Products<br />

• customer security needs statement - high-level description of security required by the customer.<br />

7.10.2.3 Notes<br />

The term customer may refer to a specific recipient of a product, system, or service, or may refer to a generalized<br />

recipient based upon market research or product targeting. Different groups of users may need to be identified and<br />

distinguished. For example, ordinary users may have different needs from administrators.<br />

7.10.3 BP.10.02 - Identify Applicable Laws, Policies, And Constraints<br />

Identify the laws, policies, standards, external influences and constraints that govern the system.<br />

7.10.3.1 Description<br />

The purpose of this base practice is to gather all external influences which affect the security of the system. A<br />

determination of applicability should identify the laws, regulations, policies and commercial standards which govern the<br />

target environment of the system. A determination of precedence between global and local policies should be<br />

performed. Requirements for security placed on the system by the system customer must be identified and the security<br />

implications extracted.<br />

7.10.3.2 Example Work Products<br />

• security constraints - laws, policies, regulations, and other constraints that influence the security of a system;<br />

• security profile - security environment (threats, organizational policy); security objectives (e.g., threats to be<br />

countered); security functional and assurance requirements; rationale that system developed to these<br />

© <strong>ISO</strong>/<strong>IEC</strong> 2002 – All rights reserved 51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!