Artifact: Security Request
Relationships
Description
Main Description

System or external request to secure IT resources or validate authority for access.

  • Secure IT resources: identifies one or more specific resources which need to be included in the security protection scheme, or need to have their level and means of protection adjusted
  • Request to access: a communication soliciting access to a particular resource or class of resources.