Skip to main content

💼 SA-15 (8) REUSE OF THREAT | VULNERABILITY INFORMATION

Description​

The organization requires the developer of the information system, system component, or information system service to use threat modeling and vulnerability analyses from similar systems, components, or services to inform the current development process.

Similar​

  • Internal
    • ID: dec-c-89a93e1d

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags