Difference between revisions of "Project Proposals/SRT"
(→Administrata) |
|||
Line 114: | Line 114: | ||
<!-->(place link to email to TSC proposing project, this can be obtained from [https://lists.fd.io/pipermail/tsc/ TSC Archives]--> | <!-->(place link to email to TSC proposing project, this can be obtained from [https://lists.fd.io/pipermail/tsc/ TSC Archives]--> | ||
− | ** Date: | + | ** Date: July 22nd 2016 |
==External links== | ==External links== | ||
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-64r2.pdf | http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-64r2.pdf |
Revision as of 02:04, 23 July 2016
srt Facts |
Project Lead: Andi Rowley
Repository: git clone https://gerrit.fd.io/r/srt |
Contents
Name
Security Response Team
Project Contact Name and Email
Repository Name
srt
Description
Key security activities for this phase include:
•Conduct the risk assessment and use the results to supplement the base line security controls;
•Analyze security requirements;
•Perform functional and security testing;
•Prepare initial documents for system certification and accreditation; and
•Design security architecture.
Although this section presents the information security components in a sequential top-down manner, the order of completion is not necessarily fixed. Security analysis of complex systems will need to be iterated until consistency and completeness is achieved.
Scope
Initial Committers
Vendor Neutral
No issue regarding vendor neutrality.
Meets Board Policy (including IPR, being within Board defined Scope etc)
Meets board policy as expressed in Technical Community Charter and IP Policy
Administrata
- Request for Project proposal consideration
- Email:
- Date: July 22nd 2016
External links
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-64r2.pdf