Functional requirements (what the system must do) and Non-functional requirements (how the system performs).
To ensure security is designed into the system rather than added later, reducing rework and vulnerabilities.
Compliance refers to meeting external legal or regulatory requirements; conformance relates to internal policies and standards.
Laws and regulations such as GDPR, HIPAA, PCI DSS, SOX, and FISMA.
Implementation of an organization-wide information security program, including risk categorization and control assessment.
Integrity and control over financial data within accounting and reporting systems.
Financial Privacy Rule, Safeguards Rule, and Pretexting Protection Rule.
To protect personal health information (PHI) and enhance privacy of electronic health records.
To protect cardholder data and ensure secure payment processing across merchants and service providers.
PII (Personally Identifiable Information) identifies an individual; PHI (Protected Health Information) relates to medical data linked to an individual.
A scenario describing how a system can be intentionally or unintentionally used in a way that causes harm or violates policy.
Use cases describe expected behavior; misuse cases describe undesired or malicious behavior.
To link each security requirement to its implementation and test cases, ensuring coverage and verification.
It determines how data should be handled, stored, and protected based on its sensitivity and impact if compromised.
Public, Internal, Confidential, and Restricted (or variations depending on the organization).
Creation, Storage, Use, Sharing, Archival, and Destruction/Disposition.
A privacy principle under GDPR allowing individuals to request deletion of their personal data.
Embedding privacy considerations (minimization, consent, transparency) into system design from the start.
To evaluate and document privacy risks associated with a system or project before deployment.
Anonymization removes identifiers irreversibly; pseudonymization replaces them with reversible tokens or keys.
Transparency (informed consent), Legitimate purpose (data use tied to a lawful purpose), and Proportionality (data use limited to what’s needed).
Threat modeling identifies potential risks that translate into security requirements and countermeasures.
Include explicit security clauses and right-to-audit provisions in contracts and perform supplier assessments.
Availability targets, encryption strength, authentication response times, and audit log retention.