A.01.08 CybersecurityA.01.08 CybersecurityCybersecurity - SWE-154 - Identify Security RisksSWE-156 - Evaluate Systems for Security RisksSWE-157 - Protect Against Unauthorized AccessSWE-159 - Verify and Validate Risk MitigationsRequirementsSWE-185 - Secure Coding Standards VerificationSWE-207 - Secure Coding PracticesTestingSWE-210 - Detection of Adversarial ActionsWork Products7.08 - Maturity of Life Cycle Products at Milestone Reviews7.09 - Entrance and Exit CriteriaProcess Asset TemplatesPAT-012 - Detection of Adversarial ActionsTopics7.22 - Space Security: Best Practices Guide8.04 - Additional Requirements Considerations for Use with Safety-Critical SoftwarePAT-012 - Detection of Adversarial ActionsSPAN LinksA.01 Software Life Cycle Planning - Secure coding guidelines SWEs-156, 154, 157, 159A.03 Software Requirements - SWEs 207 & 185A.06 Software Testing - SWE-210Analysis of SWEs and SM A.01.08 CybersecuritySWE or TopicRelated SWEs Related SMRelated ActivitySWE-154 - Identify Security Risks SWE-156 - Evaluate Systems for Security RisksSWE-157 - Protect Against Unauthorized AccessSWE-159 - Verify and Validate Risk MitigationsSWE-191 - Software Regression TestingSWE-210 - Detection of Adversarial Actions 7.22 - Space Security: Best Practices Guide8.04 - Additional Requirements Considerations for Use with Safety-Critical Software8.10 - Facility Software Safety Considerations8.18 - SA Suggested Metrics A.01 Software Life Cycle Planning SWE-156 - Evaluate Systems for Security Risks SWE-027 - Use of Commercial, Government, and Legacy SoftwareSWE-147 - Specify Reusability RequirementsSWE-154 - Identify Security RisksSWE-157 - Protect Against Unauthorized AccessSWE-159 - Verify and Validate Risk MitigationsSWE-191 - Software Regression TestingSWE-205 - Determination of Safety-Critical Software 7.22 - Space Security: Best Practices Guide8.04 - Additional Requirements Considerations for Use with Safety-Critical Software8.08 - COTS Software Safety Considerations8.18 - SA Suggested Metrics A.01 Software Life Cycle Planning SWE-157 - Protect Against Unauthorized Access SWE-050 - Software RequirementsSWE-051 - Software Requirements AnalysisSWE-057 - Software ArchitectureSWE-058 - Detailed DesignSWE-060 – Coding SoftwareSWE-061 – Coding StandardsSWE-062 – Unit TestSWE-063 Release Version DescriptionSWE-135 – Static AnalysisSWE-154 - Identify Security RisksSWE-156 - Evaluate Systems for Security RisksSWE-159 - Verify and Validate Risk MitigationsSWE-184 - Software-related Constraints and AssumptionsSWE-185 - Secure Coding Standards VerificationSWE-186 – Unit Test RepeatabilitySWE-210 - Detection of Adversarial Actions 8.04 - Additional Requirements Considerations for Use with Safety-Critical Software8.18 - SA Suggested Metrics8.55 - Software Design Analysis8.56 - Source Code Quality Analysis A.01 Software Life Cycle Planning SWE-159 - Verify and Validate Risk Mitigations SWE-087 - Software Peer Reviews and Inspections for Requirements, Plans, Design, Code, and Test ProceduresSWE-088 - Software Peer Reviews and Inspections - Checklist Criteria and TrackingSWE-135 - Static AnalysisSWE-154 - Identify Security RisksSWE-156 - Evaluate Systems for Security RisksSWE-157 - Protect Against Unauthorized AccessSWE-185 - Secure Coding Standards VerificationSWE-191 - Software Regression TestingSWE-207 - Secure Coding Practices 7.10 - Peer Review and Inspections Including Checklists8.04 - Additional Requirements Considerations for Use with Safety-Critical Software8.18 - SA Suggested Metrics A.01 Software Life Cycle Planning SWE-185 - Verification of Software Code to Coding Standards SWE-017 - Project and Software TrainingSWE-058 - Detailed DesignSWE-060 - Coding SoftwareSWE-061 - Coding StandardsSWE-087 - Software Peer Reviews and Inspections for Requirements, Plans, Design, Code, and Test ProceduresSWE-135 - Static AnalysisSWE-136 - Software Tool AccreditationSWE-157 - Protect Against Unauthorized Access 7.10 - Peer Review and Inspections Including Checklists8.04 - Additional Requirements Considerations for Use with Safety-Critical Software8.18 - SA Suggested MetricsPAT-022 - Programming Practices Checklist A.01 Software Life Cycle PlanningA.05 Software Implementation SWE-207 - Secure Coding Practices SWE-050 - Software RequirementsSWE-058 - Detailed DesignSWE-156 - Evaluate Systems for Security RisksSWE-159 - Verify and Validate Risk MitigationsSWE-211 - Test Levels of Non-Custom Developed Software 8.04 - Additional Requirements Considerations for Use with Safety-Critical Software8.18 - SA Suggested Metrics A.01 Software Life Cycle PlanningA.05 Software Implementation SWE-210 - Detection of Adversarial Actions SWE-154 - Identify Security RisksSWE-157 - Protect Against Unauthorized Access 8.04 - Additional Requirements Considerations for Use with Safety-Critical Software8.18 - SA Suggested MetricsPAT-012 - Detection of Adversarial Actions A.01 Software Life Cycle PlanningA.06 Software Testing 7.22 - Space Security: Best Practices Guide SWE-154 - Identify Security RisksSWE-156 - Evaluate Systems for Security Risks A.02 Software Assurance and Software Safety 8.04 - Additional Requirements Considerations for Use with Safety-Critical Software SWE-134 - Safety-Critical Software Design RequirementsSWE-154 - Identify Security RisksSWE-156 - Evaluate Systems for Security RisksSWE-157 - Protect Against Unauthorized AccessSWE-159 - Verify and Validate Risk MitigationsSWE-185 - Secure Coding Standards VerificationSWE-207 - Secure Coding PracticesSWE-210 - Detection of Adversarial Actions 8.02 - Software Reliability8.09 - Software Safety Analysis8.21 - Software Hazard CausesPAT-012 - Detection of Adversarial Actions A.01 Software Life Cycle PlanningA.02 Software Assurance and Software SafetyA.05 Software ImplementationA.06 Software Testing PAT-012 - Detection of Adversarial Actions SWE-210 - Detection of Adversarial Actions 8.04 - Additional Requirements Considerations for Use with Safety-Critical Software A.01.08 Cybersecurity