260 Vulnerability ManageMent
In some states, the punitive damages for customer data com-•
promise can be significant. If this is relevant to your business,
highlight it.
8.4 Requirements Document
Anyone who has worked on a formal IT project knows the neces-
sity of a requirements document. is document will align the goals,
processes, and systems in the organization with the functional capa-
bilities of the target solution. ese requirements may extend beyond
system specification and include the related processes that must be
developed or changed. Following is a list of some of the key compo-
nents of the requirements document:
Functional requirements: Explain in detail what all software •
and hardware components should do. ese requirements
may ...