Skip to content
This repository has been archived by the owner on May 17, 2022. It is now read-only.

Commit

Permalink
fixed typo
Browse files Browse the repository at this point in the history
removed an extraneous \ that broke latex conversion.
  • Loading branch information
nessimk committed Feb 13, 2019
1 parent 6403050 commit fac3a1c
Showing 1 changed file with 1 addition and 1 deletion.
Expand Up @@ -179,7 +179,7 @@ This activity assures that the architecture is aligned with the security require
### Activity
Analyze the architecture against known security requirements and best practices. Identify and collect either formally identified or informally known security requirements. Additionally, identify and include any security assumptions on which safe operation of the system relies.

Review each item on the list of known security requirements against the architecture. Elaborate the analysis to show the design-level features that address each security requirement. Perfor separate, detailed analysis iterations on parts of the architecture to simplify capturing this information if the system is large or complex. The overall goal is to verify that each known security requirement has been addressed by the system design. Note any security requirements \not clearly provided at the design level as assessment findings.
Review each item on the list of known security requirements against the architecture. Elaborate the analysis to show the design-level features that address each security requirement. Perfor separate, detailed analysis iterations on parts of the architecture to simplify capturing this information if the system is large or complex. The overall goal is to verify that each known security requirement has been addressed by the system design. Note any security requirements not clearly provided at the design level as assessment findings.

### Maturity Questions
#### Q 1
Expand Down

0 comments on commit fac3a1c

Please sign in to comment.