CHAPTER 5

Misuse and Abuse Cases

In this chapter you will

•   Learn how to develop misuse and abuse cases

•   Understand the security requirements traceability matrix (RTM)

•   See how to ensure that security requirements flow down to suppliers/providers

Use cases have been used for years to contextualize how software is to be used, conveying requirements with respect to function to developers. Misuse cases provide the opposite case, a set of requirements that should specifically not be allowed. If a use case conveys what should happen when an authorized user requests authorized functions, the misuse case is when a user attempts to do something that should be prohibited.

Misuse/Abuse Cases

Misuse or abuse cases can be considered a form of ...

Get CSSLP SECURE SOFTWARE LIFECYCLE PROFESSIONAL ALL-IN-ONE EXAM GUIDE, Third Edition, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.