Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

What are the common approaches followed for developing high-level and detailed requirements using SQUARE?

0
10 Posted

What are the common approaches followed for developing high-level and detailed requirements using SQUARE?

0
10

Approach 1 is to think about classes of requirements. For example, for access control, you would consider whether there are assets that need to be protected with access control and how you would go about implementing it. You could use a document such as OWASP’s Development Guide to get started. A list of candidate requirements areas can be found in the “Security Requirement Areas” section starting on page F-12 of Software Assurance in Acquisition: Mitigating Risks to the Enterprise. Approach 2 is to use scenarios. If you have normal user scenarios and intruder scenarios, it is pretty easy to understand what the security requirements should be. You need to understand the architecture in order to use this approach, however. In both approaches it should be relatively easy to think about what is needed to block the threat or intrusion or what is needed to protect the assets. You should do this informally and not worry about writing requirements, statements, or use cases initially. You migh

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123