Security Analysis Workflows#
For a detailed explanation of workflows and their role within the process model, please refer to the Introduction.
Security analysis is used as an umbrella term.
Analyze Platform
|
status: valid
|
||||
With a platform Security Analysis the potential attack surfaces of features shall
be analyzed. It shall be used as an input for all other analysis.
There will be only one platform Security Analysis.
|
|||||
Analyse Feature Architecture
|
status: draft
|
||||
The Security Analysis for the feature is executed.
|
|||||
Analyse Component Architecture
|
status: draft
|
||||
The Security Analysis for the component is executed.
|
|||||
Monitor Security Analysis
|
status: draft
|
||||
The Security Analyses are monitored.
|
|||||
Verify Security Analysis
|
status: draft
|
||||
The Security Analyses are verified. The verification criteria is that it can be
proven that the security requirements for functions and the corresponding security
monitoring are not violated.
|
|||||
RAS(IC) for Security Analysis#
Activity |
Responsible |
Approver |
Supporter |
|---|---|---|---|