Create
Physical-
Entity View
Create IoT
Context ViewRequirement process-- Domain-
model
analysis
Threat
analysisRequirements
engineeringChoose
tacticsMake
design
choicesViews
mapping
of
require-
mentsDerive
functional
viewDerive
information
viewDerive
operation-
al and
deploy-
ment view
engi-
neeringformulating
require-
ments:
overview of
Physical
Entities and
the basic
relation-
ships of
said
Entities.formulating
requirements:
overview of
entities in the
system and
how they
interact.
Definition of
system
borders.list of
security
risks for
which one
has to
formulate
require-
ments. First
input on
functional
strategies
for
mitigating
said risks.
Choose
tacticsMake
design
choicesDistribution
of, property
of, and
physicalDistribution,
grouping, and
nesting of
domain-Minimum
list of
identified
securityFunctional
requirements
introduce
complement-
taryChosen
tactics.