|
|
|
|
|
|
|
|
¨ |
Define
and describe “subsystems”
|
|
|
¨ |
Describe
security functions provided by
|
|
|
|
each subsystem
|
|
|
¨ |
Describe
if and how each subsystem
|
|
|
|
depends
on the presences of security
|
|
|
|
functions
in the external IT environment
|
|
|
¨ |
Describe
interactions between subsystems
|
|
¨ |
Externally
visible subsystem interfaces
|
|