![](/sites/default/files/styles/tile_md_1x/public/default_logo_4_523.png.webp?itok=vba5yvTk)
Last update: 18/10/2017
ETSI ETR 332:1996 - Security Techniques Advisory Group (STAG) - Security requirements capture
This ETSI Technical Report (ETR) provides guidance and support for a comprehensive analysis of threats, vulnerabilities, risks and for the compilation of a specific set of security requirements. It is the intention to provide the user of this ETR with a comprehensive understanding and methodology regarding threats, vulnerabilities, risks and security requirements. The security architecture of a particular system is always unique and the threats and security requirements are very specific to that system. The contents of this paper provide guidelines and checklists rather than specifying in too…
Energy and environment