![]() |
![]() |
![]() |
|
![]() |
|||
| SD 2.1: Technical System Design |
SE2.1 - System technisch entwerfen
Contents
|
|
|
|---|
Product Flow
+ "Chapter" are extra columns from the original printed version of GD 250
Handling
The solution proposal is formulated on the basis of the fields defined or referred to in activity SD1.5 - User-Level System Structure. This way, separable problem definitions at user-level are considered and evaluated in the subsequent feasibility studies.
The definition of the System Architecture comprises the representation of the technical system structure and the identification of the interfaces between the elements of the architecture and the overall System to the outside. All interfaces identified in the System Architecture must be included in the Interface Overview.
To do so the elements of the System ought to be technically characterized now, if possible, in order to position appropriate off-the-shelf products as early as possible.
The representation of the system structure is supplemented by the description of the technical operation (interaction between the elements of the architecture). The architecture description must be reconstructable and plausible so the user-level requirements and the marginal conditions defined within the scope of the User Requirements can be covered by the technical solution described.
The definition of the System Architecture has to be realized by applying approved off-the-shelf products, if possible. If necessary, a modification/reduction of the User Requirements can be realized via the requirements controlling.
In this case, the System Architecture is generated in one step. The System Architecture is completed on a step-by-step basis within the scope of the segment design.
As far as this is possible and as far as it can be derived from the User Requirements, Technical Requirements for the functionality, the interfaces, the quality, and the development and SWMM environment of the elements of the System Architecture have to be defined. The criticality of the architecture element must be specified.
Requirements for the development and SWMM environment have to be defined at system level. In case separate requirements exist for the individual elements they must be mentioned also, within the scope of the Technical Requirements for these elements. Provided that technical requirements cannot be allocated to any element of the System Architecture, they have to be specified as general requirements.
The Technical Requirements are supplemental and interpreting requirements that are demanded from the technical point of view for an element of the technical architecture. User Requirements should not be repeated here. Requirements concerning the mechanisms they are to be realized with have to be made for the IT security functions. They are the required mechanism strength and the E-level of the implementation.
Dependent on the criticality of the critical functions/components, the concept of the realization and the quality of the implementation (E-level or safety integrity level) has to be determined.
An IT security function can either be covered by an already available off-the-shelf product or else it has to be developed as SW Unit or HW Unit.
Portions realized in hardware are relevant for the evaluation. If necessary, certain criteria must be fulfilled before applying for an evaluation, dependent on the desired evaluation level (e. g. presentation of the hardware design drawings).
All those requirements for system security that are covered by the IT security portion must be identified. If required, an IT security model that grossly simplifies the cooperation of the IT security-relevant functions must be generated which still precisely and completely represents the functions.
During the refinement of the IT security functions, new elements are usually introduced and additional interfaces are created, which means there may be additional weak points. Provided that the new weak points can be exploited to harm the specified IT security objective, further measures preventing this must be included into the IT security concept. It is also possible that weak points in the form of undesired dependences and relationships occur during the refinement process (error propagation, single point of failure, inheritance of a high criticality to too many components). This may require an iteration of earlier activities, as for example activity SD1.6 - Threat and Risk Analysis.
Based on the interactions between the selected architecture, newly created interfaces in the IT security portion as well as the additional interfaces between the refined IT security portion and the remaining software must be included in the Interface Overview.
The Interface Overview must also contain a justification for the necessity of each interface from the IT security portion to the other elements in the System Architecture and the necessity of each interface within the IT security portion.
The interfaces to the application environment must be exactly described. For example, in levels according to ITSEC, the requirements for the description forms are increased.
Roles
| Role | Participation | ||||||
|---|---|---|---|---|---|---|---|
| Project Leader | cooperating
| System Designer |
responsible
| Technical Author |
cooperating
| IT Representative |
cooperating |
|
Methods
Notes
(1) In case off-the-shelf products are to be used.
(2) The methods have to be applied in object-oriented developments.
Tools Requirements
External Norms
| Norm | Process | Chapter | Obs. |
|---|---|---|---|
| /ISO IEC 12207/ | Development Process | System Architectural Design | (s. Part 3 - ISO 3.2.1) |
Pre-Tailoring forms
Matrix Entries:
Always required
Always required under given circunstances
Not required
Description of data or database only
Links to the V-Model Mailinglist
![]() |
![]() |
This page online GDPA Online Last Updated 03.Feb.2003 by C. Freericks |