SWIM Supporting Material
SWIM-DEFN-160 Security constraints
- 1 Requirement
- 2 Guidance
- 2.1 Verification Support
- 2.2 Examples
Requirement
Title | Security constraints |
---|---|
Identifier | SWIM-DEFN-160 |
Requirement | A service definition should include or refer to information about the security constraints which are expected to apply to accessing and using the service. |
Rationale | The service provider should be aware of any security constraints to be implemented. |
Verification | Completeness: Not Applicable. Consistency: Not Applicable. Correctness: If provided, verify that the information is correct. |
Examples/Notes | Example:
|
Level of | Recommended |
Guidance
Verification Support
Correctness | Check that: [Â ] The information about the security constraints which are expected to apply to accessing and using the service in the service definition is correct. |
Examples
Links to example service definitions can be found in the example service definitions page.Â
Status: Living Material