Last used in rev NPR 7150.2D
|Difference between A and B|
3.16.3 The project manager shall implement the identified software security risk mitigations addressed in the Project Protection Plan.
|Difference between B and C||Changed "implement" to "address"; |
Changed focus of requirement from risk mitigations to cybersecurity vulnerabilities and weaknesses;
Removed the requirement for them to be in the Project Protection Plan.
3.11.6 The project manager shall address identified cybersecurity vulnerabilities and weaknesses.
|Difference between C and D|