SA-15(4)
SA-15(4): Threat Modeling / Vulnerability Analysis
The organization requires that developers perform threat modeling and a vulnerability analysis for the information system at [organization-defined breadth/depth] that:
- (a): Uses [organization-defined information concerning impact, environment of operations, known or assumed threats, and acceptable risk levels];
- (b): Employs [organization-defined tools and methods]; and
- (c): Produces evidence that meets [organization-defined acceptance criteria].
Supplemental
CIA Levels | |
---|---|
Confidentiality | unknown |
Integrity | unknown |
Availability | unknown |
Overlays |
---|
None |
CSF Categories |
---|
None |