Does it make sense to disallow SHA-224 and SHA-256 to defend against quantum computers?

From Australia’s Guidelines for Cryptography:

For most purposes, a hashing algorithm with an output size of 224 bits provides 112 bits of effective security strength, with larger output sizes providing more bits of effective security stre… Continue reading Does it make sense to disallow SHA-224 and SHA-256 to defend against quantum computers?

Are there any defined approaches to identify security requirements of a system? [closed]

Are there any defined approaches that help you identify security requirements given that you have a specific decription of a system design? After a little research, I found OWASP Application Security Verification Standard. I am sure that t… Continue reading Are there any defined approaches to identify security requirements of a system? [closed]

Building Non-Functional Requirements Framework – Requirements Categories

I’m planning on documenting a framework that we built for managing non-functional requirements. This is post #2 of the series. 
In Post #1, Last In – First Out: Building a Non-Functional Requirements Framework – Overview I outlined the template and def… Continue reading Building Non-Functional Requirements Framework – Requirements Categories

Building a Non-Functional Requirements Framework – Overview

I’m planning on documenting a framework that we built for managing non-functional requirements. This is post #1 of the series. 

A pain point for our infrastructure and security teams was a lack of useable, consistent availability and security requirem… Continue reading Building a Non-Functional Requirements Framework – Overview

MSTG-ARCH-7: All security controls have a centralized implementation

In the OWASP Mobile Application Security Checklist there is a requirement MSTG-ARCH-7 which reads: "All security controls have a centralized implementation".
Now I’m struggling a bit by what is meant with "centralized implem… Continue reading MSTG-ARCH-7: All security controls have a centralized implementation