personAuthor: Manuel Schmidt, Alexander Feulner
How is modern requirements engineering implemented in practice, and what role does artificial intelligence play across the entire lifecycle—from creation and analysis to the quality assurance of requirements?
Together with our partner Innovigate, the developer of the Tracelane tool, we illustrate this with a practical demonstration. Tracelane is a modern requirements management tool with an intelligent AI assistant that creates, analyzes, evaluates, and provides concrete suggestions for improvement.
school
Webinar recording and slides
arrow_forward "Fo(u)rces of Cybersecurity Engineering"
personAuthor: Timo Karasch,
Florian Schmitt
Cybersecurity Goals, Controls, Requirements and Threats are important forces for cybersecurity engineering. It is nearly impossible to separate them in a timely manner. In fact, they influence each other during definition.
This webinar gives a simple example of the interaction of these four forces and addresses the consistency to existing standards in Cybersecurity (ISO 21434 and Automotive SPICE for Cybersecurity). It shows a possible approach for implementation in your organization.
school
Webinar recording and slides
arrow_forward "How do I bring levels to my requirement chaos?"
personAuthor: Timo Karasch
First, our processes constantly ask us to specify requirements. Then we have to bother with quite a lot of documents and specifications. Even the relevant literature cannot explain to me in an understandable way what the difference between all these requirements is supposed to be. And finally, an assessor comes and evaluates my specification as insufficient.
This is the end of it! In this webinar we want to bring levels into our requirements chaos. Using simple examples, we will show the different types of requirements and learn a few helpful methods for working with requirements.
school
Webinar recording and slides
arrow_forward "Requirements are not just for engineers"
personAuthor: Process Fellows
Involve testers, safety experts, UX and product managers in the review. Each brings a unique perspective — and helps uncover hidden assumptions.
arrow_forward "What is the difference between need, expectation and requirement?"
personAuthor: Process Fellows
Typically the terms Need, Expectation, and Requirement are distinguished as follows:
A Need describes a fundamental problem or desire of a stakeholder that should be addressed. It is often vague and not directly actionable. Needs arise from the stakeholder’s context, goals, or challenges.
Example: “I want to be able to work faster.”
An Expectation is a stakeholder’s specific idea or assumption about how a Need might be fulfilled. It is subjective and can be expressed explicitly or implicitly.
Example: “I expect the system to automatically suggest options.”
A Requirement is a documented, verifiable, and actionable specification derived from a Need or Expectation. It serves as the basis for design, implementation, and testing.
Example: “The system shall display three relevant suggestions to the user within 2 seconds.”
Summary:
Need: motivates development
Expectation: expresses a concrete idea
Requirement: a clearly defined, verifiable specification describing what is expected to be fulfilled
This distinction helps structure the process of eliciting, analyzing, and documenting requirements.
# PROCESS PURPOSE
The purpose is to specify (Cybersecurity goal = Concept-level cybersecurity requirement associated with one or more threat scenarios.) and (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) from the outcomes of cybersecurity risk management covering the (Threat Scenario = Potential cause of compromise in cybersecurity properties of one or more assets in order to realize a damage scenario.).
# PROCESS OUTCOMES
O1 (Cybersecurity goal = Concept-level cybersecurity requirement associated with one or more threat scenarios.) are specified.
O2
Cybersecurity (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) are derived from (Cybersecurity goal = Concept-level cybersecurity requirement associated with one or more threat scenarios.).
O3 (Consistency = Consistency addresses content and semantics and ensures that work products are not in contradiction to each other. Consistency is supported by bidirectional traceability.) and bidirectional (Traceability = The degree to which a relationship can be established between two or more products of the development process, especially products having a predecessor-successor or master-subordinate relationship to one another.) are maintained between cybersecurity (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) and goals and between the (Cybersecurity goal = Concept-level cybersecurity requirement associated with one or more threat scenarios.) and the (Threat Scenario = Potential cause of compromise in cybersecurity properties of one or more assets in order to realize a damage scenario.).
O4
The cybersecurity (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) are agreed and communicated to all affected parties.
Specify (Cybersecurity goal = Concept-level cybersecurity requirement associated with one or more threat scenarios.) for the (Threat Scenario = Potential cause of compromise in cybersecurity properties of one or more assets in order to realize a damage scenario.) according to the decisions regarding risk treatment to achieve risk reduction.
Specify functional and non-functional cybersecurity (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) for the (Cybersecurity goal = Concept-level cybersecurity requirement associated with one or more threat scenarios.). Specify these according to defined characteristics for (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.).
Note 1: This includes the refinement of (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) during iterations of this process.
Note 2: This includes (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) for post-development phases which may include production, operation, maintenance and decommissioning.
Note 3: Characteristics of (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) are defined in standards such as ISO IEEE 29148, ISO 26262-8:2018, or the INCOSE Guide To Writing (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.).
Note 4: Examples for defined characteristics of (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) shared by technical standards are:
verifiability (i.e., (Verification = Verification is confirmation, through the provision of objective evidence, that specified requirements have been fulfilled in a given work item.) criteria being inherent in the (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) text)
unambiguity/comprehensibility
freedom from design and implementation
not contradicting any other (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.)
personAuthor: Process Fellows
The INCOSE Guide to Writing Requirements is a comprehensive resource developed by the Requirements Working Group (RWG) of the International Council on Systems Engineering (INCOSE). It provides best practices and structured guidance for writing high-quality requirements in systems engineering. The guide contains
Characteristics of "good" requirements
Writing rules
Boilerplates / templates
Quality aspects for requirement sets
Common pitfalls when specifying requirements
The guide is available for free for INCOSE members, there is a small fee for non-members. The linked summary sheet is available for free for everybody.
school
External link to pdf file published at INCOSE website
arrow_forward "Specifying behavior under all conditions"
personAuthor: Process Fellows
It’s not just about sunny-day scenarios. Requirements should specify as well handling of failure cases, degraded modes, and edge conditions. Ask: what happens if X fails or behaves oddly?
BP2
Ensure consistency and establish bidirectional traceability. (
O3 )
Ensure (Consistency = Consistency addresses content and semantics and ensures that work products are not in contradiction to each other. Consistency is supported by bidirectional traceability.) and establish bidirectional (Traceability = The degree to which a relationship can be established between two or more products of the development process, especially products having a predecessor-successor or master-subordinate relationship to one another.) between the cybersecurity (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) and the (Cybersecurity goal = Concept-level cybersecurity requirement associated with one or more threat scenarios.). Ensure (Consistency = Consistency addresses content and semantics and ensures that work products are not in contradiction to each other. Consistency is supported by bidirectional traceability.) and establish bidirectional (Traceability = The degree to which a relationship can be established between two or more products of the development process, especially products having a predecessor-successor or master-subordinate relationship to one another.) between the (Cybersecurity goal = Concept-level cybersecurity requirement associated with one or more threat scenarios.) and the (Threat Scenario = Potential cause of compromise in cybersecurity properties of one or more assets in order to realize a damage scenario.).
Linked Knowledge Nuggets: arrow_forward "Consistency vs. Traceability – What’s the Difference?"
personAuthor: Process Fellows
Consistency ensures that related content doesn’t contradict itself – e.g., requirements align with architecture and test. Traceability, in contrast, is about links: can you follow a requirement through to implementation and verification? Both are needed – consistency builds trust, traceability enables control. Typically, traceability strongly supports consistency review.
arrow_forward "How to handle conflicting requirements?"
personAuthor: Process Fellows
Don’t sweep conflicts under the rug. Document them. Bring stakeholders together. Use impact analysis. Ultimately ensure consistency. Clarity today avoids chaos tomorrow.
arrow_forward "The role of traceability in risk control"
personAuthor: Process Fellows
Traceability isn’t just about completeness — it’s about managing impact. When a requirement changes, trace links tell you what’s affected. That’s your early-warning system.
arrow_forward "The true benefit of traceability
"
personAuthor: Process Fellows
Sometimes the creation of traceability is seen as an additional expense, the benefits are not recognized.
Traceability should be set up at the same time as the derived elements are created. Both work products are open in front of us and the creation of the trace often only takes a few moments.
In the aftermath, the effort increases noticeably and the risk of gaps is high.
If the traceability is complete and consistent, the discovery of dependencies is unbeatably fast and reliable compared to searching for dependencies at a later stage, when there may also be time pressure.
It also enables proof of complete coverage of the derived elements and allows the complete consistency check.
Communicate agreed cybersecurity (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) to all affected parties.
Note 5: (Cybersecurity goal = Concept-level cybersecurity requirement associated with one or more threat scenarios.) might be communicated as well to provide additional context information for the derived cybersecurity (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.).
# OUTPUT INFORMATION ITEMS
15-51
Analysis results (
O1, O2 )
Identification of the object under analysis.
The analysis criteria used, e.g.:
selection criteria or prioritization scheme used
decision criteria
quality criteria
The analysis results, e.g.:
what was decided/selected
reason for the selection
assumptions made
potential negative impact
Aspects of the analysis may include
correctness
understandability
verifiability
feasibility
validity
Used by these processes:
MAN.7 Cybersecurity Risk Management
SEC.1 Cybersecurity Requirements Elicitation
13-52
Communication Evidence (
O4 )
All forms of interpersonal communication such as:
e-mails, also automatically generated ones
tool-supported workflows
meeting, verbally or via meeting minutes (e.g. daily standups)
podcast
blog
videos
forum
live chat
wikis
photo protocol
Used by these processes:
SEC.1 Cybersecurity Requirements Elicitation
SEC.2 Cybersecurity Implementation
SEC.3 Risk Treatment Verification
SEC.4 Risk Treatment Validation
Used by these process attributes:
PA2.1 Performance Management
13-51
Consistency Evidence (
O3 )
Demonstrates bidirectional (Traceability = The degree to which a relationship can be established between two or more products of the development process, especially products having a predecessor-successor or master-subordinate relationship to one another.) between artifacts or information in artifacts, throughout all phases of the life cycle, by e.g.:
tool links
hyperlinks
editorial references
naming conventions
Evidence that the content of the referenced or mapped information coheres semantically along the (Traceability = The degree to which a relationship can be established between two or more products of the development process, especially products having a predecessor-successor or master-subordinate relationship to one another.) chain, e.g., by
performing pair working or group work
reviewing by peers, e.g., spot checks
maintaining revision history in documents
providing change commenting (via e.g., meta-information) of database or repository entries
Note: This evidence can be accompanied by e.g., Definition of Done (DoD) approaches.
Used by these processes:
SEC.1 Cybersecurity Requirements Elicitation
SEC.2 Cybersecurity Implementation
SEC.3 Risk Treatment Verification
SEC.4 Risk Treatment Validation
17-51
Cybersecurity goals (
O1 )
Describe a property of an (Asset = Object that has value or contributes to value.) that it is necessary to protect by means of cybersecurity
This may include:
Confidentiality needs
Authorization needs
Integrity needs
Availability needs
etc.
Information that can be included in the goals:
Goal Title
Objective
Scope
Key Metrics and success criteria
Milestones (if applicable)
Action plan (if applicable)
Stakeholders involved
Link to potential risks
Budget and resources
Timeline
Compliance and standards
Sign-off and approval
Used by these processes:
SEC.1 Cybersecurity Requirements Elicitation
17-00
Requirement (
O1, O2 )
An expectation of functions and capabilities (e.g., non- (Functional requirement = A statement that identifies what a product or process must accomplish to produce required behavior and/or results.)), or one of its interfaces
from a black-box perspective
that is verifiable, does not imply a design or implementation decision, is unambiguous, and does not introduce contradictions to other (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.)
A (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) statement that implies, or represents, a design or implementation decision is called “Design Constraint”.
Examples of (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) aspects at the (System = A collection of interacting items organized to accomplish a specific function or set of functions within a specific environment.) level are thermal characteristics such as:
heat dissipation
dimensions
weight
materials
Examples of aspects related to (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) about (System = A collection of interacting items organized to accomplish a specific function or set of functions within a specific environment.) interfaces are:
connectors
cables
housing
Examples of (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) at the (Hardware = Physical equipment used to process, store, or transmit computer programs or data.) level are:
lifetime and mission profile, lifetime robustness
maximum price
storage and transportation (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.)
functional behavior of analog or digital circuits and logic
quiescent current, voltage impulse responsiveness to crank, start-stop, drop-out, load dump
temperature, maximum (Hardware = Physical equipment used to process, store, or transmit computer programs or data.) heat dissipation
power consumption depending on the operating state such as sleep-mode, start-up, reset conditions
frequencies, modulation, signal delays, filters, control loops
power-up and power-down sequences, accuracy and precision of signal acquisition or signal processing time
computing resources such as memory space and CPU clock tolerances
maximum abrasive wear and shearing forces for e.g. pins or soldering joints
(Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) resulting from lessons learned
safety related (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) derived from the technical safety concept
Used by these processes:
SEC.1 Cybersecurity Requirements Elicitation
17-54
Requirement Attribute (
O1, O2 )
Meta-attributes that support structuring and definition of release scopes of (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.).
Can be realized by means of tools.
Note: usage of (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.) attributes may further support analysis of (Requirement = A property or capability that must be achieved or possessed by a system, system item, product or service to satisfy a contract, standard, specification or other formally imposed documents.).