Skip to content

Commit

Permalink
Add subsections
Browse files Browse the repository at this point in the history
Signed-off-by: David A. Wheeler <[email protected]>
  • Loading branch information
david-a-wheeler committed Apr 26, 2024
1 parent d2b78a3 commit 8eb313d
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion secure_software_development_fundamentals.md
Original file line number Diff line number Diff line change
Expand Up @@ -250,7 +250,7 @@ Requirements don’t even *have* to be written down to be used, especially for a

Of course, the actual requirements depend on what you’re trying to accomplish.

### Common Security Objectives
#### Common Security Objectives

So how can you determine the security requirements for a particular system? One way to identify security requirements is to think about the common security objectives and supporting security functions we have *already* discussed and determine the specific requirements for your system in each category. In particular, think about how each one applies to the kind of information your program will manage. Let’s walk through each security objective and supporting security function, and discuss some things to consider:

Expand Down

0 comments on commit 8eb313d

Please sign in to comment.