Background:
In recent years, the number of attacks on information systems has increased, and data protection requirements have become stricter under the law. Companies demand comprehensive and continuous attention to security issues at all stages of the product life cycle.
Problem:
Non-functional security requirements are often formulated vaguely or copied from standards without adaptation to the project specifics. This leads to high risks, repetition, or unachievable tasks for the IT team.
Solution:
The analyst must:
Key features:
Can checklists for security be fully trusted when forming requirements?
Checklists are useful as a starting point, but do not cover all business specifics. Security requirements should be individually discussed for each project.
Is security auditing mandatory for all parts of the system?
Some modules may not process sensitive data or be internal. However, risk analysis is mandatory for the entire solution. The principle of least privilege is implemented.
Is it worth trying to implement security requirements 100%?
Generally, the most critical measures corresponding to data classification and threat levels are executed. "Absolute security" is a myth; compromises are inevitable, and it is important to manage risks.
Negative Case: Security requirements were reduced to a point of "compliance with ISO standard" and forgotten about data transmission channel encryption settings. Result: incident, fine. Pros: Quickly created documentation. Cons: Actual vulnerability and problems during the audit.
Positive Case: The analyst engaged a security expert, conducted a threat analysis session, and documented requirements as acceptance criteria. All measures were agreed upon and feasible. Pros: Protection was implemented, audit successfully passed. Cons: More time and effort were required for coordination.