1 / 8

High-Level Security Rules for Project Development at CNES: Ensuring ISS Integration and Compliance

Understand the key principles governing security decisions during projects at CNES, emphasizing ISS integration, project management, and sensitivity to security risks. Get insights into the ISS approach, essential security activities, and steps for integrating security requirements. Detailed guidelines on V-cycle stages and security items are provided. Key events involve CNES ISS authorities for enhanced project security.

Download Presentation

High-Level Security Rules for Project Development at CNES: Ensuring ISS Integration and Compliance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CNES security development process

  2. Basic rules High level principles for ISS activities on projects are: • Decisions dealing with security risks must be approved on relevant functional/hierarchical level. • For each project, ISS must be integrated in the project management. • Each project must integrate CNES security requirements. • CNES ISS authorities (independent of project team) must be involved in each key event of the project. • Security requirements must be function of functional sensitivity and security risks.

  3. ISS approach 1/6 • ISS approach for project development must be integrated in the global approach of the project. • The following slides describe the main stages (V cycle) of a project and, for each of them, what are the relevant security items. • Two security activities are dealt with: • security of target IS to be developed, • security of development environment.

  4. ISS approach 2/6

  5. ISS approach 3/6

  6. ISS approach 4/6

  7. ISS approach 5/6

  8. ISS approach 6/6

More Related