Part 1: Create a list of concerns a security professional needs to ask/address in each of the eight steps of the System Life Cycle. see attached doc
Part 2: Research tools and resources available for supporting these processes.
Part 1: Create a list of concerns a security professional needs to ask/address in each of the eight steps of the System Life Cycle. see attached doc
Part 2: Research tools and resources available for supporting these processes.