Decomposing System Security Requirements

Decomposing System Security Requirements
Decomposing System Security Requirements
White Paper
March 11, 2020

Decomposing System Security Requirements

Trusted Computing: the COTS Perspective Series

A system’s security requirements are determined based on various factors, including (but not limited to) the program and application for which it’s being developed, national regulations, and, sometimes, IP protection procedures. But, once a system’s essential security level is defined, what’s next? How are top-level security requirements then translated into the system- and subsystem-level Trusted Computing capabilities? How is a comprehensive security plan developed, implemented, and verified to meet requirements?

Login to download the white paper to read about the process of decomposing high-level requirements for system security to develop an entire system security protection plan. You will become more familiar with critical steps in this process, such as:

  • Identifying what to protect
  • Recognizing system threats
  • Creating a system security plan