Difference between revisions of "Build operational security guide"

Jump to: navigation, search
(Reverting to last version not containing links to s1.shard.jp)
(5 intermediate revisions by 2 users not shown)
Line 1: Line 1:
[http://s1.shard.jp/frhorton/vwktsknc4.html africa water pump
] [http://s1.shard.jp/olharder/stan-olsen-auto.html automatic mechanical orient watch
] [http://s1.shard.jp/olharder/autoroll-654.html site] [http://s1.shard.jp/olharder/general-motor.html auto auctions guam
] [http://s1.shard.jp/olharder/auto-recreational.html autopia car care forum
] [http://s1.shard.jp/frhorton/qwl7aihru.html african american dance companies
] [http://s1.shard.jp/losaul/diabetes-australia.html pc links australia
] [http://s1.shard.jp/frhorton/u4h18i4kg.html african animal figurine
] [http://s1.shard.jp/olharder/autoroll-654.html http] [http://s1.shard.jp/losaul/real-estate.html european rabbit in australia
] [http://s1.shard.jp/galeach/new163.html asia.com canon
] [http://s1.shard.jp/frhorton/98rznyn69.html africa cape map south street town
] [http://s1.shard.jp/galeach/new80.html tasia maris gardens apartments cyprus
] [http://s1.shard.jp/bireba/symantic-antivirus.html dod antivirus download
] [http://s1.shard.jp/frhorton/yoc3js17e.html african american free saver screen
] [http://s1.shard.jp/olharder/autoroll-654.html webmap] [http://s1.shard.jp/galeach/new144.html asianfriendfiner
] [http://s1.shard.jp/olharder/autopilots-for.html dura automotive
] [http://s1.shard.jp/galeach/new49.html asian girl school tiny
] [http://s1.shard.jp/bireba/norton-antivirus.html antivirus filtering
] [http://s1.shard.jp/olharder/automobile-accident.html automobile accident personal injury claims winning cases] [http://s1.shard.jp/galeach/new184.html disneys anastasia] [http://s1.shard.jp/bireba/grisoft-antivirus.html giant antivirus software
] [http://s1.shard.jp/olharder/autoroll-654.html links] [http://s1.shard.jp/olharder/autoroll-654.html index] [http://s1.shard.jp/olharder/autoroll-654.html top] [http://s1.shard.jp/bireba/download-antivirus.html etrust antivirus 7.1 retail
] [http://s1.shard.jp/galeach/new127.html asia ex japan] [http://s1.shard.jp/losaul/australian-laws.html didasko australia
] [http://s1.shard.jp/frhorton/dfj31yuuh.html african after american civil war
] [http://s1.shard.jp/losaul/simple-plan.html australian animal pictures
] [http://s1.shard.jp/galeach/new181.html asia best university
] [http://s1.shard.jp/frhorton/lwp18cwan.html the african rainforest
] [http://s1.shard.jp/frhorton/77murrpay.html history of african american baseball
] [http://s1.shard.jp/olharder/automotive-training.html autofuturo
] [http://s1.shard.jp/losaul/sai-global-australia.html australia driving map
] [http://s1.shard.jp/losaul/australia-bank.html australian spiders photos
] [http://s1.shard.jp/olharder/wheels-and-deals.html auto rentals ft. myers
] [http://s1.shard.jp/olharder/autoroll-654.html url] [http://s1.shard.jp/olharder/auto-copart-sale.html in house financing auto
] [http://s1.shard.jp/galeach/new64.html tales of phantasia translation psx
] [http://s1.shard.jp/galeach/new74.html asian naturism
] [http://s1.shard.jp/galeach/new36.html anastasia dream piece
] [http://s1.shard.jp/galeach/new185.html how to kill asian beetles
] [http://s1.shard.jp/galeach/new33.html asian lepard
] [http://s1.shard.jp/frhorton/mz6vv73zx.html vandals in north africa
] [http://s1.shard.jp/olharder/auto-insurance.html brown deer auto sales milwaukee

Latest revision as of 06:49, 3 June 2009



  • Provide stakeholder with documentation on operational security measures that can better secure the product.
  • Provide documentation for the use of security functionality within the product.


  • Implementer


  • Once per iteration.

In the course of conception, elaboration, and evaluation, there will generally be many items identified that should be communicated to one or more roles at deployment. This information should all be collected in a role-driven implementation guide that addresses security concerns.

Document pre-install configuration requirements

Begin by documenting the environmental requirements that must be satisfied before the system is installed. See the task on operational environment assumptions for more detail.

Document application activity

Document any security-relevant use of resources, including network ports, files on the file system, registry resources, database resources etc. See the activity on Resource identification for more detail.

Document the security architecture

Document the threat profile assumed in design and the high-level security functionality of the system as relevant to the user - including authentication mechanisms, default policies for authentication and other functions, and any security protocols that are mandatory or optional. For protocols used, document the scope of their protection.

Document security configuration mechanisms

List, and explain all security configuration options present in the system, and make note of their default and recommended settings. Be explicit about how they work, referencing any technologies utilized.

Document significant risks and known compensating controls

Any known security risks that the customer may find reasonable should be documented, along with recommended compensating controls, such as recommended third party software that can mitigate the issue, firewall configurations, or intrusion detection signatures.