From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Requirements traceability
From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Requirements traceability
- [Brad] Welcome back to Cybrary's ISSEP course. I'm your instructor, Brad Rhodes. Let's jump into requirements traceability. In this video, we're going to cover questions about requirements traceability, we're going to talk about the requirements traceability matrix, which is how we track requirements, and we're going to talk about why we should do RTM. So, what should be traceable when we talk about requirements? Well, it's kind of like stakeholders, everything. Everything needs to be traceable. If we don't trace everything, then we're going to miss something, pretty straightforward. Another question we want to ask ourselves when we talk about requirements traceability is linkages. Who's responsible, one, for making them, and two, how do we make sure they're defined? Well, we really have to look at linkages, 'cause if we don't, then it's very possible that one module or one part of that system of interest won't actually connect or work correctly with another one. So who's…
Contents
-
-
-
-
-
Objectives and security planning and design overview2m 37s
-
(Locked)
Stakeholder requirements3m 55s
-
(Locked)
Threats and resilience6m 1s
-
(Locked)
System security principles2m 26s
-
(Locked)
Context, CONOPS, and requirements documents5m 11s
-
(Locked)
Functional analysis3m 11s
-
(Locked)
Requirements traceability3m 29s
-
(Locked)
Trade-off studies3m 45s
-
(Locked)
Module summary2m 55s
-
-
-
-
-
-
-