SA-11(02)(c)[02] | the developer of the system, system component, or system service is required to perform vulnerability analyses during the subsequent testing and evaluation of the system, component, or service that conducts modeling and analyses at <SA-11(02)_ODP[04] breadth and depth>; |
SA-11(02)(d)[01] | the developer of the system, system component, or system service is required to perform threat modeling during development of the system, component, or service that produces evidence that meets <SA-11(02)_ODP[05] acceptance criteria>; |
SA-11(02)(d)[02] | the developer of the system, system component, or system service is required to perform threat modeling during the subsequent testing and evaluation of the system, component, or service that produces evidence that meets <SA-11(02)_ODP[05] acceptance criteria>; |
SA-11(02)(d)[03] | the developer of the system, system component, or system service is required to perform vulnerability analyses during development of the system, component, or service that produces evidence that meets <SA-11(02)_ODP[06] acceptance criteria>; |
SA-11(02)(d)[04] | the developer of the system, system component, or system service is required to perform vulnerability analyses during the subsequent testing and evaluation of the system, component, or service that produces evidence that meets <SA-11(02)_ODP[06] acceptance criteria>. |
SA-11(02)(a)[02] | the developer of the system, system component, or system service is required to perform vulnerability analyses during development of the system, component, or service that uses <SA-11(02)_ODP[01] information>; |
SA-11(02)(a)[03] | the developer of the system, system component, or system service is required to perform threat modeling during the subsequent testing and evaluation of the system, component, or service that uses <SA-11(02)_ODP[01] information>; |
SA-11(02)(a)[04] | the developer of the system, system component, or system service is required to perform vulnerability analyses during the subsequent testing and evaluation of the system, component, or service that uses <SA-11(02)_ODP[01] information>; |
SA-11(02)(b)[01] | the developer of the system, system component, or system service is required to perform threat modeling during development of the system, component, or service that employs <SA-11(02)_ODP[02] tools and methods>; |
SA-11(02)(b)[02] | the developer of the system, system component, or system service is required to perform threat modeling during the subsequent testing and evaluation of the system, component, or service that employs <SA-11(02)_ODP[02] tools and methods>; |
SA-11(02)(b)[03] | the developer of the system, system component, or system service is required to perform vulnerability analyses during development of the system, component, or service that employs <SA-11(02)_ODP[02] tools and methods>; |
SA-11(02)(b)[04] | the developer of the system, system component, or system service is required to perform vulnerability analyses during the subsequent testing and evaluation of the system, component, or service that employs <SA-11(02)_ODP[02] tools and methods>; |
SA-11(02)(c)[01] | the developer of the system, system component, or system service is required to perform threat modeling at <SA-11(02)_ODP[03] breadth and depth> during development of the system, component, or service; |
SA-11(02)(a)[01] | the developer of the system, system component, or system service is required to perform threat modeling during development of the system, component, or service that uses <SA-11(02)_ODP[01] information>; |