Are there any defined approaches to identify security requirements of a system? [closed]

Are there any defined approaches that help you identify security requirements given that you have a specific decription of a system design? After a little research, I found OWASP Application Security Verification Standard. I am sure that t… Continue reading Are there any defined approaches to identify security requirements of a system? [closed]

Building Non-Functional Requirements Framework – Requirements Categories

I’m planning on documenting a framework that we built for managing non-functional requirements. This is post #2 of the series. 
In Post #1, Last In – First Out: Building a Non-Functional Requirements Framework – Overview I outlined the template and def… Continue reading Building Non-Functional Requirements Framework – Requirements Categories

Building a Non-Functional Requirements Framework – Overview

I’m planning on documenting a framework that we built for managing non-functional requirements. This is post #1 of the series. 

A pain point for our infrastructure and security teams was a lack of useable, consistent availability and security requirem… Continue reading Building a Non-Functional Requirements Framework – Overview

MSTG-ARCH-7: All security controls have a centralized implementation

In the OWASP Mobile Application Security Checklist there is a requirement MSTG-ARCH-7 which reads: "All security controls have a centralized implementation".
Now I’m struggling a bit by what is meant with "centralized implem… Continue reading MSTG-ARCH-7: All security controls have a centralized implementation

What is the industry-standard recommendation for where non-functional security requirements end and enterprise requirements begin?

I have been tasked with coming up with security requirements for a project. I am finding it difficult to find the line between where project specific, nonfunctional requirements end and general security requirements for the enterprise begi… Continue reading What is the industry-standard recommendation for where non-functional security requirements end and enterprise requirements begin?