ABSTRACT

There’s more to securing systems than analyzing architectures for security requirements. If the process is near perfect in that upper-management support abounds, relationships with all the stakeholders are pristine, perhaps no more would need to be done than to hand off the security requirements from an analysis and then move on to the next system?