Security needs for a proposed system
Determine the security needs for a proposed system, how to secure current
needs, and how to identify and rank order system stakeholders.
Establish stakeholder accountability in the system scope and determine
those parts of requirements that document and require security.
Create use case and misuse case diagrams, determine overlapping security
needs in a use case diagram, and create supporting documents in Unified
Modeling Language (UML) by adding security concerns.
Identify and rank order system vulnerabilities and manage the necessary
documents to create a complete business specification of the system.