Risks within the System Life Cycle

 Part 1: Create a list of concerns a security professional needs to ask/address in each of the eight steps of the System Life Cycle. see attached doc

 Part 2:  Research tools and resources available for supporting these processes. 

Tags: No tags