A replacement application has had its business case approved. In preparation for a requirements workshop, an architect is working with you to ensure that appropriate security requirements have been captured. Which of the following documents BEST captures the security requirements?

A. Solution overview document
B. Use case document
C. Security requirements traceability matrix
D. Business requirements document

D
Explanation: The business requirements document best captures the security requirements.
The solution overview document describes the overall solution but does not list any specifics. The Use case document details how the new solution will be used. The security requirements traceability matrix maps the security requirements to the controls that are employed for the requirements but is not used to initially map the security requirements.

Computer Science & Information Technology

You might also like to view...

You can resize an image proportionally by using the middle sizing handle

Indicate whether the statement is true or false

Computer Science & Information Technology

Excel's TIME function returns the number of minutes in the range 1 to 60

Indicate whether the statement is true or false.

Computer Science & Information Technology