Skip to content

Commit bb222d0

Browse files
Changes resulting from review
1 parent 1b5bfe5 commit bb222d0

File tree

2 files changed

+3
-8
lines changed

2 files changed

+3
-8
lines changed

process/process_areas/security_analysis/guidance/security_analysis_guideline.rst

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ The analysis is done by as described in the flowchart :ref:`platform_security_an
9393
#. Identify the assets of the platform. The assets are the elements of the platform that have to be protected. The assets can be identified by using the trust boundary model and the platform architecture. The assets can be identified using the following questions:
9494

9595
- What are the critical
96-
- functions, interfaces, components (HW and SW), data of the platform?
96+
- features, interfaces, components (HW and SW), data of the platform?
9797
- communication paths and interfaces of the platform?
9898
- configurations of the platform?
9999
- What critical information is shared between the components?
@@ -146,11 +146,6 @@ The analysis is done by as described in the flowchart :ref:`platform_security_an
146146
If there are changes they have to be analyzed with an impact analysis
147147
:need:`gd_temp__change_impact_analysis`. If needed the Security Analysis has to be
148148
updated accordingly. Therefore all necessary steps have to be repeated.
149-
.. #. If a threat scenario applies, use the template :need:`gd_temp__plat_threat_scenario`, :need:`gd_temp__feat_sec_ana_threat` or :need:`gd_temp__comp_sec_ana_threat` to perform the analysis.
150-
.. #. The title of the analysis should be easily recognizable e.g. "Component xy unauthorized access".
151-
.. #. Link the violated architecture with the "violates" attribute.
152-
.. #. Replace the placeholders in the "id" attribute with the name of the feature or component and a short description of the element so that it can be easily identified.
153-
.. #. Document the threat ID from the threat scenario :need:`gd_guidl__sec_ana_threat_scenarios` that applies to the element in the "threat_id" attribute.
154149

155150

156151
Examples for Security Analysis at feature level

process/process_areas/security_analysis/security_analysis_concept.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -135,12 +135,12 @@ As shown above in the flow diagram, the first step in the platform security anal
135135

136136
How to mitigate?
137137
================
138-
Security requirements resulting from the Platform analysis become stakeholder requirements for the features. Identified risks without a mitigation remain open and are tracked in the issue tracking
138+
Security requirements resulting from the Platform analysis become :need:`wp__requirements_stkh` for the features. Identified risks without a mitigation remain open and are tracked in the issue tracking
139139
system :need:`wp__issue_track_system` until they are resolved.
140140
Resolving includes acceptance of the risk or avoidance.
141141
Further a new security control may be needed to reduce the risk.
142142
Finally also the risk may shared, if applicable.
143-
Security assumptions resulting from the anlysis are documented properly.
143+
Security assumptions resulting from the analysis are documented properly as :need:`wp__requirements_sw_platform_aou`.
144144

145145
What analysis shall be done in which level?
146146
===========================================

0 commit comments

Comments
 (0)