Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

Chapter 1 – Introduction
1.1 Background
1.2 Benefits of Using the SSE-CMM
1.3 About the SSE-CMM Project
1.4 Relationship to Other Disciplines and Efforts
1.5 About this Document
Chapter 2 – CMM Concepts
2.1 Process Improvement
2.2 Expected Results
2.3 Common Misunderstandings
2.4 Key Concepts
3.1 Security Engineering
3.2 Security Engineering Process Overview
3.3 SSE-CMM Architecture Description
3.4 Summary Chart
Chapter 4 – Using the SSE-CMM
4.1 How Do I Start?
4.2 Using the SSE-CMM for Process Improvement
4.3 Using the SSE-CMM for Capability Evaluation
4.4 Using the SSE-CMM to Gain Assurance?
Chapter 5 – Generic Practices
Capability Level 1 – Performed Informally
Capability Level 2 – Planned and Tracked
Capability Level 3 – Well Defined
Capability Level 4 – Quantitatively Controlled
Capability Level 5 – Continuously Improving
Chapter 6 – Security Base Practices
PA01 – Administer Security Controls
PA02 – Assess Impact
PA03 – Assess Security Risk
PA04 – Assess Threat
PA05 – Assess Vulnerability
PA06 – Build Assurance Argument
PA07 – Coordinate Security
PA08 – Monitor Security Posture
PA09 – Provide Security Input
PA10 – Specify Security Needs
PA11 – Verify and Validate Security
Chapter 7 – Project and Organizational Base Practices
General Security Considerations
PA12 – Ensure Quality
PA13 – Manage Configurations
PA14 – Manage Project Risks
PA15 – Monitor and Control Technical Effort
PA16 – Plan Technical Effort
PA17 – Define Organization's Systems Engineering Process
PA18 – Improve Organization's Systems Engineering Processes
PA19 – Manage Product Line Evolution
PA20 – Manage Systems Engineering Support Environment
PA21 – Provide Ongoing Skills and Knowledge
PA22 – Coordinate with Suppliers
Security Engineering References
Security Engineering Process Area References
Systems/Software Engineering References
Systems/Software Process References
Capability Maturity Model References
Appendix A – Quick Reference
Security Engineering Process Area Overview
Project and Organizational Process Area Overview
Request for Comments
0 of .
Results for:
No results containing your search query
P. 1


|Views: 53|Likes:
Published by Venkatesh Pai

More info:

Published by: Venkatesh Pai on Oct 11, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 7 to 39 are not shown in this preview.
You're Reading a Free Preview
Pages 47 to 138 are not shown in this preview.
You're Reading a Free Preview
Pages 145 to 253 are not shown in this preview.
You're Reading a Free Preview
Pages 260 to 340 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->