View Categories

Cyber Security – Requirements Evolution through Development

As the development process evolves, the integration of components takes place, which may lead to potential new vulnerabilities which have to be prevented. For that it will be necessary to refine the previously defined cyber security requirements. This task may be an iterative process, since all the systems and components are gradually incorporated. When implementing the requirements, it is important to follow technical best practices such as secure programming, software development guidelines or hardware redundancy mechanisms, among other techniques. The correct allocation and implementation of the requirements for each system or component should also be verified.

Main Question

Is a review of the architectural design considered based on frequently updated requirements?

Sub-Questions

  1. Is a process established to verify the implementation of cyber security requirements?

References