Is IBM’s "Security and Privacy by Design" practices based on any earlier standard or guideline?

The following process overview schematic is derived from IBM’s Security in Development The IBM Secure Engineering Framework, but I think I’ve seen a very similar process diagram before, though I cannot find it or remember it. Would this IB… Continue reading Is IBM’s "Security and Privacy by Design" practices based on any earlier standard or guideline?