- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 257字
- 2021-06-10 18:42:33
Requirements
Initially, requirements are specified for the product, frequently embedded in a variety of specification types:
- System-level requirements are described in a System Requirements Specification (SyRS)
- A Software Requirements Specification (SRS) describes use cases for software, and associated functional and non-functional requirements
- Interface requirements are specified in an Interface Requirements Specification (IRS)
- Hardware requirements may be specified in a hardware functional or hardware requirements specification.
A process of requirements derivation is used to derive requirements from the system level to individual components.
Security engineers in a waterfall development program progress through the life cycle phases as time progresses. One of the first activities to complete is a security requirements analysis. Just as products have functional requirements allocated to them, those products must also have security requirements allocated.
Engineers use many sources to identify security requirements. These can include Security Technical Implementation Guides (STIGs), compliance requirements, and system threat models.
A useful tool for creating and tracking security requirements is the Security Requirements Traceability Matrix (SRTM). An SRTM maps security requirements to their implementation within components of the product, discusses the method for their verification, and tracks that verification status.
As the name suggests, the matrix can be used to track security requirements for closure as an input to a security test plan and procedures document.
- 網(wǎng)絡(luò)安全與管理
- 工業(yè)互聯(lián)網(wǎng)安全
- 白帽子講Web安全(紀念版)
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實踐
- Computer Forensics with FTK
- ARM匯編與逆向工程:藍狐卷·基礎(chǔ)知識
- CTF競賽權(quán)威指南(Pwn篇)
- 計算機網(wǎng)絡(luò)安全技術(shù)研究
- 隱私計算
- 編譯與反編譯技術(shù)實戰(zhàn)
- 網(wǎng)絡(luò)安全態(tài)勢感知
- 隱私計算:推進數(shù)據(jù)“可用不可見”的關(guān)鍵技術(shù)
- 網(wǎng)絡(luò)空間安全:拒絕服務(wù)攻擊檢測與防御
- Mastering Malware Analysis
- 物聯(lián)網(wǎng)信息安全技術(shù)