Solution Implementation
The Information Systems Security (ISS) engineering activities during the earlier phases provide the basis for the updating, monitoring, and controlling system security risks and the respective mitigation measures or controls that are implemented during this phase of the system development. A summary of ISS engineering activities for this phase includes the following:
- Revise the security related statement in the CONOPS and security requirements based on functional analysis performed during early stages of the Solution Implementation phase.
- Analyze the physical/system architecture, resulting in an allocation of the securityfeatures to be implemented in the system under development. Security trade studies may be needed to identify the appropriate security controls to be implemented that balance system and security requirements.
- Integrate the security features into the security architecture to balance them with the system architecture and design. Security trade studies, interface securityrequirements, and other Systems Engineering (SE) outputs contribute to successful integration of security architecture into system design. System design reviews are key milestones for ensuring that security controls are integrated into system development.
- Update the ISSP, one of the SCAP documents based on the expected ISS functional and assurance controls derived from the system architecture and design. Refine the system test planning and procedures to ensure that all security requirements and controls are addressed. The ISSP supports Validation (SEM Section: 4.12, subsection 4.12.1) and Synthesis (SEM Section: 4.5) to assess controls and assurance as being cost effective and meeting the ISS requirements. Use Risk Management (SEM Section: 4.10) and Requirements Management (SEM Section: 4.3) to mitigate security risk to acceptable levels. The criticality/sensitivity of the system and its information assets guides the type and level of controls and testing.
- Develop a user's guide, training plans, and Contingency/Disaster Recovery Plans (C/DRP). Security procedures, rules, training, and planning for C/DRP operations may be integrated into the integrated logistics support and lifecycle planning for systems.
- Conduct security testing. Security controls and mechanisms may be testedincrementally and as a part of system development testing. For mission-criticalsystems, a third party shall conduct independent testing of system vulnerabilities.
- Create final the Security Certification and Authorization Package (SCAP) documents. The results of ISSE activities-including relevant results from related SE elements such as Integrated Technical Planning (SEM Section: 4.2), Synthesis (SEM Section: 4.5), Validation and Verification (SEM Section: 4.12), and Lifecycle Engineering (SEM Section: 4.13)-shall be considered as final SCAP documents. The Air Traffic Organization provides templates for collecting and presenting the SCAP documentation.