![]() It’s important to know that principles apply to every phase of your development projects, and to all architectural layers of your final products (business, data, applications, and technology). ![]() ![]() Also, you will define responsibilities and how to control whether the procedure is followed. For the mentioned example, you will define, e.g., a backup procedure and clearly state that incremental backup should be done every day, and full backup done during the weekend. So, your principle will be “Assure information protection in processing, transit, and storage.” Based on principles, procedures will be developed that define activities in detail. For example, most of the projects deal with information. These are your secure engineering principles. To assure management of those treats, high-level rules are defined to apply security. These may include: earthquakes, tornadoes, floods, misuse, and malicious human behavior (find more threats and vulnerabilities in Catalogue of threats & vulnerabilities. In order to do that, you should take into account threats from natural disasters and humans. Secure engineering is actually how you will apply security while developing your IT projects. Secure engineering and secure engineering principles
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |