search

SEC.2 Cybersecurity Implementation

# PROCESS PURPOSE 
The purpose is to refine the design of the , and , consistent with the cybersecurity and to ensure they are implemented.

# PROCESS OUTCOMES 
  • O1 The architecture of the , , and is refined.
  • O2 and bidirectional are established between cybersecurity and architecture, architecture and components of architecture; and bidirectional are established between cybersecurity and detailed design and detailed design.
  • O3 Appropriate cybersecurity controls are selected.
  • O4 Weaknesses are analyzed.
  • O5 Detailed design of and is refined.
  • O6 and bidirectional are established between the architecture and detailed design; and and bidirectional are established between the components of architecture and detailed design.
  • O7 The agreed cybersecurity implementation is communicated to all affected parties.

# BASE PRACTICES 
BP1 Refine the details of the architecture. ( O1 )
BP2 Ensure consistency and establish bidirectional traceability for cybersecurity requirements. ( O2 )
BP3 Select cybersecurity controls. ( O3 )
BP4 Analyze architecture for weaknesses. ( O4 )
BP5 Refine the detailed design. ( O5 )
BP6 Ensure consistency and establish bidirectional traceability for architecture and detailed design. ( O6 )
BP7 Communicate agreed results of cybersecurity implementation. ( O7 )

# OUTPUT INFORMATION ITEMS 
13-52 Communication Evidence ( O7 )
13-51 Consistency Evidence ( O2, O6 )
17-52 Cybersecurity controls ( O3 )
04-52 Hardware Architecture ( O1, O2 )
04-53 Hardware Detailed Design ( O2, O5 )
04-04 Software Architecture ( O1, O2 )
04-05 Software Detailed Design ( O2, O5 )
04-06 System Architecture ( O1, O2 )
15-50 Vulnerability analysis Evidence ( O4 )