I am totally confused on this section - SDLC Overlays which I am supposed to co-auther with Gustavo.
I see Gustavo has added all this content, and I heard during the meeting there is too much information here.
Gustavo - let me know if it is ok to delete and start over?
Mark/Anil - Would it possible to provide a sample for the security control overlay section. I don't see any consistency in the content as authored in other sections in this chapter, and what is needed here. It would be great if you can provide one sample template on what the content looks like. I went through the work instruction on the PPT that Mark presented, and understand the analysis part of the various perspective and views. Given that what is the deliverable for this section - Is it the table described in Step 8 - example provided was Proxy which is a pattern - but for SDLC do we need to first collect the patters from chapter 5 and then create the table for each pattern in Step 8 ? or view SDLC as a pattern and come up with the table similar to Step 8 in the PPT ?
------------------------------
Pradeep Nambiar
Director
Pexus LLC
------------------------------
Original Message:
Sent: Mar 11, 2021 02:09:49 PM
From: Hillary Baron
Subject: Meeting Recording - 11 March 2021
Today's meeting was dedicated to presenting the work instructions for Chapter 6 authors. Please see the recording attached if you were unable to attend. Mark has also posted a pdf version of the slides from today's presentation and a brief work instruction in the library.
------------------------------
Hillary Baron CCSK v4
Program Manager, Research
CSA
Seattle WA
------------------------------