7.0 OPERATIONAL REQUIREMENTS
Provide the operational requirements in this section. Operational requirements describe how the
system will run and communicate with operations personnel.
Do not state how these requirements will be satisfied. For example, in the Reliability section,
answer the question, “How reliable must the system be?” Do not state what steps will be taken
to provide reliability. The rules for stating requirements, outlined in Section 4.1, also apply to
these requirements.
Distinguish preferences from requirements. Requirements are based on business needs.
Preferences are not. If, for example, the user expresses a desire for sub-second response but does
not have a business-related reason for needing it, that desire is a preference.
Other applicable requirements on system attributes may be added to the list of subsections
below. If there is a ConOps for the system or application, all subsections listed in Section 6 of
the ConOps document must be addressed in Section 7 of the SRS.
7.1 Security
The Security Section describes the need to control access to the data. This includes controlling
who may view and alter application data. Use the following criteria:
• State the consequences of the following breaches of security in the subject application:
− Erasure or contamination of application data
− Disclosure of Government secrets
− Disclosure of privileged information about individuals
• State the type(s) of security required. Include the need for the following as appropriate:
− State if there is a need to control access to the facility housing the application.
− State the need to control access by class of users. For example, “No user may access any
part of this application who does not have at least a (specified) clearance.”
− State the need to control access by data attribute. State, for example, if one group of
users may view an attribute but may not update it while another type of user may update
or view it.
− State the need to control access based on system function. State, for example, if there is a
need to grant access to certain system functions to one type of users, but not to others.
For example, "The system shall make Function N available to the System Administrator
only."
− State if there is a need for accreditation of the security measures adopted for this
application. For example, C2 protection must be certified by an independent authorized
organization.
7.2 Audit Trail
List the activities that will be recorded in the application’s audit trail. For each activity, list the
data to be recorded.