25.02.2015 Views

Volere Requirements Specification Template

Volere Requirements Specification Template

Volere Requirements Specification Template

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Considerations<br />

Ask questions from your marketing department to discover unstated<br />

assumptions that have been made about the portability of the product.<br />

15 Security <strong>Requirements</strong><br />

15a. Is the system confidential?<br />

Content<br />

<strong>Specification</strong> of who has authorized access to the system, and under what<br />

circumstances that access is granted.<br />

Motivation<br />

To understand the expectations for confidentiality aspects of the system.<br />

Examples<br />

“Only direct managers can see the personnel records of their staff.”<br />

“Only holders of current security clearance can enter the building.”<br />

Fit Criterion<br />

System function name or system data name<br />

User role/s and/or names of people who have clearance<br />

Considerations<br />

Is there any data that is sensitive to the management? Is there any data that<br />

low level users do not want management to have access to? Are there any<br />

processes that might cause damage or might be used for personal gain? Are<br />

there any people who should not have access to the system?<br />

Avoid solving how you will design a solution to the security requirements.<br />

For instance, don’t design a password system. Your aim here is to identify<br />

what the security requirement is. The design will come from this description.<br />

Consider asking for help. Computer security is a highly-specialised field, and<br />

one where improperly-qualified people have no business being. If your<br />

product has need of more than average security, we advise that you make<br />

use of a security consultant. They are not cheap, but the results of<br />

inadequate security can be even more expensive.<br />

15b. File integrity requirements<br />

Content<br />

<strong>Specification</strong> of the required integrity of databases and other files.<br />

<strong>Volere</strong> <strong>Template</strong> V6.1 Copyright © Atlantic Systems Guild 39<br />

This template may be copied for internal use provided copyright is acknowledged

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!