2021-08-02 15:24:06 +00:00
# Design Security
2021-08-02 17:30:16 +00:00
## Line-by-line Instructions
### What are the most important facts that a developer should know about the security of this system?
2021-08-02 15:24:06 +00:00
Briefly describe the most important parts of your security strategy. Include any points that new developers will find hard to understand or any key decisions that have changed.
2021-08-02 17:30:16 +00:00
### What are the ranked goals for security in this system?
2021-08-02 15:24:06 +00:00
Consider how the sample security goals apply to your system. Add, edit, or delete goals to fit your plans. Order them from most important to least important.
2021-08-02 17:30:16 +00:00
### What physical security mechanisms will be used?
2021-08-02 15:24:06 +00:00
Consider the sample physical security strategy bullets and adjust them to fit your project.
2021-08-02 17:30:16 +00:00
### What network security mechanisms will be used?
2021-08-02 15:24:06 +00:00
Consider the sample network security strategy bullets and adjust them to fit your project.
2021-08-02 17:30:16 +00:00
### What operating system security will be used?
2021-08-02 15:24:06 +00:00
Consider the sample operating system security strategy bullets and adjust them to fit your project.
2021-08-02 17:30:16 +00:00
### What application security mechanisms will be used?
2021-08-02 15:24:06 +00:00
Consider the sample application security strategy bullets and adjust them to fit your project.
2021-08-02 17:30:16 +00:00
### Security Checklist
2021-08-02 15:24:06 +00:00
Use this checklist to help evaluate how well your selected security mechanisms will achieve your stated goals.