The Security Constraints table identifies the constraints that are imposed on systems functionality due to some aspects of system design or implementation.
To create a Security Constraints table
Click the Add New button. The new row is added.
In the Applies To cell, click and in the Select Subject Of Security Constraint dialog, choose the needed constrained element(s):
Asset
Asset Role
Exchange
Security Process
Click OK.
In the Rule Specification cell, click and in the Specification dialog, select the language and specify the body.
The Rule Specification can be defined in English as well as using expressions or formulas (OCL).
To add an existing Security Constraint
Click the Add Existing button.
In the Select Elements dialog, select Security Constraints. The filled row is added to the table.
Generating a report
There is a predefined report for the Security Constraints table.
To generate the report
In the table toolbar, click Report.
Select the location and type the name for the report file.