The new approach for modeling the Security Control (and its specialization) is based on Requirements. The profile changes are described in the following table:
Before migration | After migration | Comment | ||
---|---|---|---|---|
Name | Type | Name | Type | |
Security Control | Activity | Security Control | Class | Aditionally, Security Process is created to overtake the information, that cannot be stored in Security Control [Class]. |
Security Control Family | Comment | Security Control Family | Class | The Criterion from SecurityControlFamily [comment] is moved to the Text of the SecurityControlFamily [class, requirement]. Information about the Annotated Element is moved to ToDo. |
Enhanced Security Control | Activity | Enhanced Security Control | Class | Aditionally, Security Process is created to overtake the information, that cannot be stored in Security Control [Class]. |
Security Control Action | Call Behavior Action | Security Process Action | Call Behavior Action | |
- | - | Security Process | Activity | Security Process is a new element dedicated for modeling security behaviors. |