U.S. Flag Official website of the Department of Homeland Security

Note: This page is part of the us-cert.gov archive.This document is part of the US-CERT website archive. These documents are no longer updated and may contain outdated information. Links may also no longer function. Please contact info@us-cert.gov if you have any questions about the US-CERT website archive.



A primary objective for this content area is to raise acquirers’ awareness of their role in “building security in” for major software-intensive systems. The initial articles describe an acquisition life-cycle framework for security activities, products, and reviews and for selected acquisition contexts and life cycle phases. The authors provide additional guidance on methods and resources for acquirers to identify and manage security risks, with the goal of producing systems that are sufficiently robust to assure mission success.

Title Updated datesort ascending
System-of-Systems Influences on Acquisition Strategy Development 2013-07-02
Supply-Chain Risk Management: Incorporating Security into Software Development 2013-07-02
Finding a Vendor You Can Trust in the Global Marketplace 2013-07-02
Assuring Software Systems Security: Life Cycle Considerations for Government Acquisitions 2013-07-02
Building Security into the Business Acquisition Process 2013-07-02
A Systemic Approach for Assessing Software Supply-Chain Risk 2013-05-14
Acquisition Overview: The Challenges 2013-05-14
Back to Top