SA-15(4)
SA-15(4): Threat Modeling / Vulnerability Analysis
The organization requires that developers perform threat modeling and a vulnerability analysis for the information system at [one of ] that:
- (a): Uses [one of ];
- (b): Employs [one of ]; and
- (c): Produces evidence that meets [one of ].
Supplemental
CIA Levels | |
---|---|
Confidentiality | high |
Integrity | high |
Availability | high |
Overlays |
---|
None |
CSF Categories |
---|
None |