ABSTRACT

Determination of the correct implementation in the completed IT system, with the security requirements and approach agreed-upon by the users and the acquisition authority. 23