Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

📖 Sources

⛳ Key Findings

Item

Link/source

Findings/recommendation regarding USCT simulation

Relevance

Comment

BB description from GovStack “perspective”

https://govstack.gitbook.io/specification/architecture-and-nonfunctional-requirements/introduction#2.3-building-blocks

HIGH

Implementation considerations (additionally to Principles for Digital Development)

https://govstack.gitbook.io/specification/architecture-and-nonfunctional-requirements/3-considerations

List of factors which should be considered up front

BB Design Principles

https://govstack.gitbook.io/specification/architecture-and-nonfunctional-requirements/4-building-block-design-principles

May come in handy if we want to touch on how BBs were designed

Onboarding Products

https://govstack.gitbook.io/specification/architecture-and-nonfunctional-requirements/6-onboarding

How to connect to existing applications and environments in touched on here

HIGH

Standards

https://govstack.gitbook.io/specification/architecture-and-nonfunctional-requirements/7-standards

Loose list of standards, not really of interest for us

Types of security

https://govstack.gitbook.io/specification/security-requirements/2-description

Build-time Security and Deployment time Security are the types of security - good to know!

HIGH

Security Terminology

https://govstack.gitbook.io/specification/security-requirements/3-terminology

Can be used for reference for us internally

Privacy

https://govstack.gitbook.io/specification/security-requirements/5-cross-cutting-requirements#5.1-privacy

Briefly mentioned there, more to come according to Steve

Detailed list of security requirements

https://govstack.gitbook.io/specification/security-requirements/5-cross-cutting-requirements#5.1-privacy

https://govstack.gitbook.io/specification/security-requirements/6-security-building-block-modules

Extensive lists of general security related requirements - too niche for our primary users

  • No labels