|
|
|
|
|
Activity:
Define Security Requirements (CMMI Level 3 : RD 2.1 )
|
|
Participating Roles
Responsible:
Architect
Business Analyst
Accountable:
Architect
Consult:
Subject Matter Expert
Informed:
Development Manager
Project Manager
Test Manager
Release Manager |
Security requirements specify steps taken to protect the organization's information assets. They must take into consideration any industry-specific regulatory requirements. These requirements deal with identity and authentication, access control and authorization, accounting and auditability, and data integrity and privacy.
Entry Criteria
When:
- After the input requirements are available.
Dependencies:
- User Scenarios Complete: User scenarios have been created, reviewed, and approved.
- Quality of Service Requirements Complete: Quality of service requirements have been created, reviewed, and approved.
- Domain Model Complete: The domain model has been created, reviewed, and approved.
Sub-Activities
|
1 |
Analyze Input Requirements |
- Analyze the scenarios, quality of service requirements, and any industry-specific regulations for input requirements specific to security.
|
2 |
Draft Security Requirements |
- Create a draft of the security requirements from initial input.
|
3 |
Review Security Requirements |
- Review the draft security requirements. Update the requirements based on feedback.
|
4 |
Baseline Requirements |
- Baseline the reviewed and approved security requirements for the project. This baseline is used in change management and revising project estimates during replanning.
|
Exit Criteria
|
The security requirements are reviewed, approved, and baselined. | |
|
|
|
|
(C) 2005 Microsoft Corporation. All rights reserved.
MSF for CMMI Process Improvement: Build 050707 |
|