Experienced Global Cybersecurity expert with a proven track record of delivering innovative solutions to international corporates which enhance complex frameworks and lead to process efficiencies and cost savings.

© 2021 Probiti All rights reserved

Security Requirement challenges?
>
>
Security Requirement challenges?

Stakeholders who have a direct association with requirements such as users, developers, project sponsors, customers, security professionals, project managers and testers collaborate through a predefined security requirement process. However as a consequence of considering a range of different perspectives, there will inevitably conflict between different stakeholder views, and hence, a key part of security requirements is the resolution of such conflicts. The well-planned security requirement should ultimately streamline the acceptance process.

Some of the other challenges:

  • The ambiguous requirement is commonly seen when formal security requirement is absence leading to ineffective control in managing interpretation of security requirements.
  • Defining a good security requirement doesn’t only means an understanding of assets and their values, it is equally important to evaluate assets at different stages of their lifecycle; creation, processing, storing, archiving and deletion.
  • Choosing the right security requirement, develop it on time within budget using available resources requires specialised skills. It’s cost-effective to acquire professional services and have it correctly developed.

There are no comments

Leave a Reply

Your email address will not be published. Required fields are marked *

five × 3 =

Start typing and press Enter to search

Shopping Cart