This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "BP3 Capture security requirements"

From OWASP
Jump to: navigation, search
 
 
Line 1: Line 1:
==Overview==
+
#redirect [[:Category:BP3 Capture security requirements]]
Ensure that security requirements have the same level of “citizenship” as all other “must haves.” It’s easy for application architects and project managers to focus on functionality when defining requirements, since they support the greater purpose of the application to deliver value to the organization. Security considerations can easily go by the wayside. So it is crucial that security requirements be an explicit part of any application development effort. Among the factors to be considered:
 
* An understanding of how applications will be used, and how they might be misused or attacked.
 
* The assets (data and services) that the application will access or provide, and what level of protection is appropriate given your organization’s appetite for risk, regulations you are subject to, and the potential impact on your reputation should an application be exploited.
 
* The architecture of the application and probable attack vectors.
 
* Potential compensating controls, and their cost and effectiveness.
 
 
 
{{Template:SecureSoftware}}
 
[[Category:CLASP Best Practice]]
 
[[Category:OWASP CLASP Project]]
 

Latest revision as of 10:44, 29 May 2006