Top Banner
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Using a Capability Maturity Model to Derive Security Requirements A security engineer is often assigned to a project that already has defined security objectives. But on occasion, the security engineer may be tasked with the initial definition of the objectives. While this assignment may be exciting because of the important role the security engineer is to play, it may also be somewhat daunting due to the large solution space. In order to guide one's efforts in this task, the security engineer could turn to the Systems Security Engineering Capability Maturity Model (SSE-CMM). This mo... Copyright SANS Institute Author Retains Full Rights       A       D
29

CMM Derive Security Requirements

Apr 07, 2018

Download

Documents

Malawig Kayvin
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 1/29

Page 2: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 2/29

Page 3: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 3/29

Page 4: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 4/29

Page 5: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 5/29

Page 6: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 6/29

Page 7: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 7/29

Page 8: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 8/29

Page 9: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 9/29

Page 10: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 10/29

Page 11: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 11/29

Page 12: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 12/29

Page 13: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 13/29

Page 14: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 14/29

Page 15: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 15/29

Page 16: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 16/29

Page 17: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 17/29

Page 18: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 18/29

Page 19: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 19/29

Page 20: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 20/29

Page 21: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 21/29

Page 22: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 22/29

Page 23: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 23/29

Page 24: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 24/29

Page 25: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 25/29

Page 26: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 26/29

Page 27: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 27/29

Page 28: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 28/29

Page 29: CMM Derive Security Requirements

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 29/29