SA-15 (4)     Development Process, Standards, And Tools | Threat Modeling / Vulnerability Analysis

The organization requires that developers perform threat modeling and a vulnerability analysis for the information system at [Assignment: organization-defined breadth/depth] that:
     SA-15 (4)(a):  Uses [Assignment: organization-defined information concerning impact, environment of operations, known or assumed threats, and acceptable risk levels];
     SA-15 (4)(b):  Employs [Assignment: organization-defined tools and methods]; and
     SA-15 (4)(c):  Produces evidence that meets [Assignment: organization-defined acceptance criteria].

                    
                

Applicable CNSSI 1253 Baselines

Confidentiality
  • L
  • M
  • H
Integrity
  • L
  • M
  • H
Availability
  • L
  • M
  • H

Related Controls