This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "High Level Requirements Categories"
From OWASP
(This is more of a framework of requirements for an overall project than pure Development requirements. Definitely needs work and code-specific requirements should probably be split out from overall r) |
(No difference)
|
Revision as of 07:10, 26 February 2011
- 1 Intro
- 2 Categories of Requirements
- 2.1 Compliance
- 2.2 Auditability
- 2.3 Application Security
- 2.4 Additional Security Considerations
- 2.4.1 Decoys, Honeypots, and other devices for detection and delay
- 2.4.2 Network, Hardware, Physical, OS, Platform, and Framework Considerations
- 2.4.3 Platform Security Considerations
- 2.4.4 Operational Security Considerations
- 2.4.4.1 Clean desk policy
- 2.4.4.2 Bonding of outsourced/off-shored Developers
- 2.4.4.3 Need to know
- 2.4.4.4 Trade secrets
- 2.4.4.5 Posting questions to help, support, and user forums
- 2.4.4.6 Customer Service Identification and Authenticaion considerations
- 2.4.4.7 =Distinguishing a legitimate user from a social-engineering scam-artist=
- 2.5 Encryption Requirements