A system’s security requirements are determined based on various factors, including (but not limited to) the program and application for which it’s being developed, national regulations, and, sometimes, IP protection procedures. But, once a system’s essential security level is defined, what’s next? How are top-level security requirements then translated into the system- and subsystem-level Trusted Computing capabilities? How is a comprehensive security plan developed, implemented, and verified to meet requirements?
Login to download the white paper to read about the process of decomposing high-level requirements for system security to develop an entire system security protection plan. You will become more familiar with critical steps in this process, such as: