Security Requirements
Security requirements are configurable requirements that can be distributed to objects such as organizations (internal or external), applications, devices, and locations. Security requirements can be specified in different levels. The levels can be triggered based on several different factors such as classification of information used by the object, or a specific tag added to the object.
Create Security Requirements
A guide on how to create or change a security requirement
Using Security Requirements with Conditions
Security goals – information classification You can use multiple conditions to distribute your requirements. In the example below we have…
Distribution of Security Requirements
How to distribute your security requirements to your objects in Ciso
Responding to Security Requirements
How to respond - make a statement - to security requirements.
Connecting Security Requirements
How to connect security requirements to standards, regulations, and guidelines
Reporting and Follow Up
How to follow up security requirements' fulfilment and statement
