Skip to content

Commit 8eb313d

Browse files
Add subsections
Signed-off-by: David A. Wheeler <[email protected]>
1 parent d2b78a3 commit 8eb313d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

secure_software_development_fundamentals.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -250,7 +250,7 @@ Requirements don’t even *have* to be written down to be used, especially for a
250250

251251
Of course, the actual requirements depend on what you’re trying to accomplish.
252252

253-
### Common Security Objectives
253+
#### Common Security Objectives
254254

255255
So how can you determine the security requirements for a particular system? One way to identify security requirements is to think about the common security objectives and supporting security functions we have *already* discussed and determine the specific requirements for your system in each category. In particular, think about how each one applies to the kind of information your program will manage. Let’s walk through each security objective and supporting security function, and discuss some things to consider:
256256

0 commit comments

Comments
 (0)