CSSLP: Secure Software Requirements

This course is included in our On-demand training solution.


Integrating security into the software development process and identifying key security objectives is paramount to successful secure software development. In this course, you’ll learn about internal and external security requirements and how to classify and categorize data. You’ll also explore functional requirements such as role and user definitions, the role of the deployment environment on requirements, and sequencing and timing requirements. Finally, this course covers operational requirements such as deployment and management solutions. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Secure Software Lifecycle Professional (CSSLP) exam.

Target Audience

Individuals interested in secure software lifecycle design concepts and methodologies, candidates for the Certified Secure Software Lifecycle Professional (CSSLP) exam



Expected Duration

60 min.

Course Objectives

Course Introduction

Internal Requirements

  • identify typical internal security requirements
  • External Requirements

  • identify typical external security requirements
  • Data Classification: Part I

  • identify data state categories
  • Data Classification: Part II

  • identify data usage categories
  • Data Ownership

  • distinguish between the data owner and data custodian roles
  • Labeling

  • distinguish between the different impact level definitions
  • Data Types

  • distinguish between structured and unstructured data
  • Data Lifecycle

  • distinguish between generation, retention, and disposal
  • Role and User Definitions

  • identify characteristics of role and user definitions
  • Deployment Environment

  • identify the role of the deployment environment within functional requirements
  • Objects, Activities, and Actions

  • distinguish between objects, activities, and actions
  • Sequencing and Timing Requirements

  • identify best practices for sequencing and timing
  • Deployment Requirements

  • identify characteristics of software deployment requirements
  • Operations Requirements

  • identify characteristics of operations requirements
  • Management Requirements

  • identify characteristics of management requirements
  • Exercise: Examining Secure Software Requirements