A.01.08 CybersecurityA.01.08 CybersecurityCybersecurity - SWE-154 - Identify Security RisksSWE-156 - Evaluate Systems for Security RisksSWE-157 - Protect Against Unauthorized AccessSWE-159 - Verify and Validate Risk MitigationsRequirementsSWE-185 - Secure Coding Standards VerificationSWE-207 - Secure Coding PracticesTestingSWE-210 - Detection of Adversarial ActionsWork Products7.08 - Maturity of Life Cycle Products at Milestone Reviews7.09 - Entrance and Exit CriteriaProcess Asset TemplatesPAT-012 - Detection of Adversarial Actions - RetiredTopics7.22 - Space Security: Best Practices Guide8.04 - Additional Requirements Considerations for Use with Safety-Critical SoftwarePAT-012 - Detection of Adversarial Actions - RetiredSPAN LinksA.01 Software Life Cycle Planning - Secure coding guidelines SWEs-156, 154, 157, 159A.03 Software Requirements - SWEs 207 & 185A.06 Software Testing - SWE-210Analysis of SWEs and SM A.01.08 CybersecuritySWE or TopicRelated SWEs Related SMRelated ActivitySWE-154 - Identify Security RisksSWE-156 - Evaluate Systems for Security RisksSWE-157 - Protect Against Unauthorized AccessSWE-159 - Verify and Validate Risk MitigationsSWE-191 - Software Regression TestingSWE-210 - Detection of Adversarial Actions7.22 - Space Security: Best Practices Guide8.04 - Additional Requirements Considerations for Use with Safety-Critical Software8.10 - Facility Software with Safety Considerations8.18 - SA Suggested MetricsA.01 Software Life Cycle PlanningSWE-156 - Evaluate Systems for Security RisksSWE-027 - Use of Commercial, Government, and Legacy SoftwareSWE-147 - Specify Reusability RequirementsSWE-154 - Identify Security RisksSWE-157 - Protect Against Unauthorized AccessSWE-159 - Verify and Validate Risk MitigationsSWE-191 - Software Regression TestingSWE-205 - Determination of Safety-Critical Software7.22 - Space Security: Best Practices Guide7.25 - Artificial Intelligence And Software Engineering8.04 - Additional Requirements Considerations for Use with Safety-Critical Software8.08 - COTS Software Safety Considerations8.18 - SA Suggested Metrics8.25 - Artificial Intelligence And Software AssuranceA.01 Software Life Cycle PlanningSWE-157 - Protect Against Unauthorized AccessSWE-050 - Software RequirementsSWE-051 - Software Requirements AnalysisSWE-057 - Software ArchitectureSWE-058 - Detailed DesignSWE-060 – Coding SoftwareSWE-061 – Coding StandardsSWE-062 – Unit TestSWE-063 Release Version DescriptionSWE-135 – Static AnalysisSWE-154 - Identify Security RisksSWE-156 - Evaluate Systems for Security RisksSWE-159 - Verify and Validate Risk MitigationsSWE-184 - Software-related Constraints and AssumptionsSWE-185 - Secure Coding Standards VerificationSWE-186 – Unit Test RepeatabilitySWE-210 - Detection of Adversarial Actions8.04 - Additional Requirements Considerations for Use with Safety-Critical Software8.18 - SA Suggested Metrics8.55 - Software Design Analysis8.56 - Source Code Quality AnalysisA.01 Software Life Cycle PlanningSWE-159 - Verify and Validate Risk Mitigations SWE-087 - Software Peer Reviews and Inspections for Requirements, Plans, Design, Code, and Test ProceduresSWE-088 - Software Peer Reviews and Inspections - Checklist Criteria and TrackingSWE-135 - Static AnalysisSWE-154 - Identify Security RisksSWE-156 - Evaluate Systems for Security RisksSWE-157 - Protect Against Unauthorized AccessSWE-185 - Secure Coding Standards VerificationSWE-191 - Software Regression TestingSWE-207 - Secure Coding Practices7.10 - Peer Review and Inspections Including Checklists8.04 - Additional Requirements Considerations for Use with Safety-Critical Software8.18 - SA Suggested MetricsA.01 Software Life Cycle PlanningSWE-185 - Verification of Software Code to Coding StandardsSWE-017 - Project and Software TrainingSWE-058 - Detailed DesignSWE-060 - Coding SoftwareSWE-061 - Coding StandardsSWE-087 - Software Peer Reviews and Inspections for Requirements, Plans, Design, Code, and Test ProceduresSWE-135 - Static AnalysisSWE-136 - Software Tool AccreditationSWE-157 - Protect Against Unauthorized Access7.10 - Peer Review and Inspections Including Checklists8.04 - Additional Requirements Considerations for Use with Safety-Critical Software8.18 - SA Suggested MetricsPAT-022 - Programming Practices ChecklistA.01 Software Life Cycle PlanningA.05 Software ImplementationSWE-207 - Secure Coding PracticesSWE-050 - Software RequirementsSWE-058 - Detailed DesignSWE-156 - Evaluate Systems for Security RisksSWE-159 - Verify and Validate Risk MitigationsSWE-211 - Test Levels of Non-Custom Developed Software8.04 - Additional Requirements Considerations for Use with Safety-Critical Software8.18 - SA Suggested MetricsA.01 Software Life Cycle PlanningA.05 Software ImplementationSWE-210 - Detection of Adversarial ActionsSWE-154 - Identify Security RisksSWE-157 - Protect Against Unauthorized Access8.04 - Additional Requirements Considerations for Use with Safety-Critical Software8.18 - SA Suggested MetricsA.01 Software Life Cycle PlanningA.06 Software Testing7.22 - Space Security: Best Practices GuideSWE-154 - Identify Security RisksSWE-156 - Evaluate Systems for Security RisksA.02 Software Assurance and Software Safety8.04 - Additional Requirements Considerations for Use with Safety-Critical SoftwareSWE-134 - Safety-Critical Software Design RequirementsSWE-154 - Identify Security RisksSWE-156 - Evaluate Systems for Security RisksSWE-157 - Protect Against Unauthorized AccessSWE-159 - Verify and Validate Risk MitigationsSWE-185 - Secure Coding Standards VerificationSWE-207 - Secure Coding PracticesSWE-210 - Detection of Adversarial Actions8.02 - Software Quality8.09 - Software Safety Analysis8.21 - Software Hazard CausesPAT-012 - Detection of Adversarial Actions - RetiredA.01 Software Life Cycle PlanningA.02 Software Assurance and Software SafetyA.05 Software ImplementationA.06 Software TestingPAT-012 - Detection of Adversarial Actions - RetiredSWE-210 - Detection of Adversarial Actions8.04 - Additional Requirements Considerations for Use with Safety-Critical SoftwareA.01.08 Cybersecurity