Peer Reviewed Journal via three different mandatory reviewing processes, since 2006, and, from September 2020, a fourth mandatory peer-editing has been added.
A cybersecurity strategy provides a plan for the integration of security controls and security-linked functional requirements that are implemented across the system that is composed to protect the organization’s operational missions. A cybersecurity strategy must include consideration for expected as well as compromised performance, such as when a system is under attack. Implementing this plan requires extensive collaboration across all participants in the lifecycle—within and outside of the organization—as more services and third-party elements are used. This paper focuses primarily on the elements of the cybersecurity strategy that are critical for predicting the desired outcome based on decisions implemented in the early segments of the lifecycle and examines how the available evidence assembled along the way can be structured for software assurance monitoring