O3.19 Develop privacy requirements and select mitigation strategies

Practice

  • Create a data flow diagram to map the system's entities and processes, identify privacy threats using established categories, and assess risks.

  • Use established categories such as those from LINDDUN or other privacy threat modeling frameworks to systematically identify where privacy risks may arise within your system.

  • Regularly revisit and refine your privacy requirements and mitigation strategies to ensure they remain effective.

Resources

Last updated