NCAE Mapping HubAuthoritative cross-reference for DCWF, NCAE Knowledge Units, O*NET, and the EWU Cyber Operations program
T865
Translate security requirements into application design elements including documenting the elements of the software attack surfaces, conducting threat modeling, and defining any specific security criteria.