“Project 5: Database Security Assessment
Start Here
Step 1: Provide an Overview for Vendors
Step 2: Provide Context for the Work
Step 3: Provide Vendor Security Standards
Step 4: Describe Defense Models
Step 5: Explore Database Defensive Methods
Step 6: Provide a Requirement Statement for System Structure
Step 7: Provide Operating System Security Components
Step 8: Write Requirements for Multiple Independent Levels of Security
Step 9: Include Access Control Concepts, Capabilities
Step 10: Include Test Plan Requirements
Step 11: Compile the RFP Document