 |
 |
 |
 |
 |
 |
 |
 |
| ¨ |
Define
and describe “subsystems”
|
|
|
| ¨ |
Describe
security functions provided by
|
|
|
|
each subsystem
|
|
|
| ¨ |
Describe
if and how each subsystem
|
|
|
|
depends
on the presences of security
|
|
|
|
functions
in the external IT environment
|
|
|
| ¨ |
Describe
interactions between subsystems
|
|
| ¨ |
Externally
visible subsystem interfaces
|
|