Decomposing System Security Requirements

Decomposing System Security Requirements

Trusted Computing: the COTS Perspective Series

A system’s security requirements are determined based on various factors, including (but not limited to) the program and application for which it’s being developed, national regulations, and, sometimes, IP protection procedures. But, once a system’s essential security level is defined, what’s next? How are top-level security requirements then translated into the system- and subsystem-level Trusted Computing capabilities? How is a comprehensive security plan developed, implemented, and verified to meet requirements?

Trusted Computing: The COTS Perspective Series
Managing system security requirements calls for multiple iterations and collaboration to identify risks and vulnerabilities in the system and develop mitigation strategies.

Download the white paper to read about the process of decomposing high-level requirements for system security to develop an entire system security protection plan. You will become more familiar with critical steps in this process, such as:

  • Identifying what to protect
  • Recognizing system threats
  • Creating a system security plan