The tool works by collecting information about a feature, determining the risk rating, and generating the appropriate security requirements, the tool explained. The initial risk assessment estimates risk before getting the security team involved.
Read full news article on SD Times