Software Requirement: The Two Ends of a Bridge

Software requirement arises out of a business need. Someone from the business sector feels that some critical business requirement can be met by building an application and shall provide some amount of automation and enhancement as compared to the manual process. They further desire it to be built by either internal software development team or an external/outsourced team. A business requirement document is then prepared to provide both ‘What Is’ and ‘What Needs To Be’ scenarios.

( Read more:   How Should a CISO choose the right Anti-Malware Technology? )

What Is’ cites the current process as it is – end to end as happening in the business i.e. manually or in a legacy standalone system. Due to this critical business process happening manually a lot of effort goes into translating the manual business information into some kind of system to acquire sensible reports and analysis out of this. The latter might also not be happening in an application; it might be drawn out through an excel sheet with the help of certain functions and queries.

( Read more:  Annual Survey on Cloud Adoption Status Across Industry Verticals )

This business requirement is then to be given to the project manager/product manager/development manager to discuss it with the business team and their teams so as to prepare a technical document based on which the development work begins. The 'Two Ends of The Bridge' need to be well connected and have a strong connecting factor in between having a 50:50 knowledge of both ends. He must be able to identify what exactly is the requirement, what does the technical translation intend to deliver and if there is any gap between the two in shape of a risk.
For Example, a vehicle starting from one end and after covering the 80% of bridge learns some disastrous fact about the bridge!

Have a new insight to share with the information security community? Share your views under the bridge, in the comments below or write your article

Views: 129

Join the Discussion ...

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform



CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by SACHIN BP SHETTY Apr 24. 1 Reply

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us


Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service