You are on page 1of 3

2021/05/16

SCOPING THE SYSTEM


TOPIC 3

PART 6
Security REquirements

Security Requirements

The security requirements must cover areas such as:


• Authentication & password management
• Authorization and role management
• Audit logging & analysis
• Network & data security
• Code integrity & validation testing
• Cryptography
• Data validation

1
2021/05/16

Actions to be performed to reach security goals:


 Integrity
• Software must be protected from subversion
which may include corruption, tampering,
overwriting, destruction.
• Integrity must be preserved both during the
software development & during its execution.

 Confidentiality (including privacy)


• To prevent unauthorised access.

 Authentication / Authorisation
• Process to validate a user’s logon
information shall be enforced to manage
the access to restricted area.
• Problems faced include encryption and
storage of passwords.
• Determine what resources an authenticated person has access to.

 User roles
• Map user roles to available / permissible
functionality.
- Menus?

2
2021/05/16

You might also like