+ All Categories
Home > Documents > CMM Derive Security Requirements

CMM Derive Security Requirements

Date post: 07-Apr-2018
Category:
Upload: malawig-kayvin
View: 219 times
Download: 0 times
Share this document with a friend
29
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Using a Capability Maturity Model to Derive Security Requirements A security engineer is often assigned to a project that already has defined security objectives. But on occasion, the security engineer may be tasked with the initial definition of the objectives. While this assignment may be exciting because of the important role the security engineer is to play, it may also be somewhat daunting due to the large solution space. In order to guide one's efforts in this task, the security engineer could turn to the Systems Security Engineering Capability Maturity Model (SSE-CMM). This mo... Copyright SANS Institute Author Retains Full Rights       A       D
Transcript

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 1/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 2/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 3/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 4/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 5/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 6/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 7/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 8/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 9/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 10/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 11/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 12/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 13/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 14/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 15/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 16/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 17/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 18/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 19/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 20/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 21/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 22/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 23/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 24/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 25/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 26/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 27/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 28/29

8/6/2019 CMM Derive Security Requirements

http://slidepdf.com/reader/full/cmm-derive-security-requirements 29/29


Recommended