How to Build Security into Software Requirements

Course Description

Building security into software from the beginning means addressing it in the requirements phase. Security requirements take the same form as functional and non-functional requirements, but they address the need to protect assets, functionality, and software integrity in the face of active misuse and abuse.

Course Themes

  • Recommend techniques to secure software during the requirements phase
  • Demonstrate how requirements can be written to fit into existing software requirements
  • Differentiate between functional and non-functional requirements
  • Explain the goals and different forms of requirements

Learning Objectives

  • Describe elements that are characterized as “good” software requirement
  • Differentiate between normal software requirements and software security requirements
  • Fundamentally describe the importance of identifying software requirements
  • Define the fundamental goals of software security requirements
  • Begin to identify security requirements and the issues they address

Course Outline

A Software Requirements Primer

  • The Importance of Requirements
  • Functional Versus Non-Functional Requirements
  • Categorize These Requirements
  • Understanding SMART Requirements
  • The Role of Requirements in the SDLC
  • Forms of Requirements

What Are Software Security Requirements?

  • The Goals of Security Requirements
  • Why Consider Security Early?
  • Two ways to Approach Security Requirements

Details

Delivery Format: eLearning

Duration: 3/4 Hour

Level: Intermediate

Intended Audience:

  • Developers
  • Development Managers
  • QA Engineers
  • Architects
  • Software Requirements Specialists

Competencies: Understanding of the software development life cycle

Prerequisites: 

Get more course information