This is a skeleton, but functional, for what could be written about each part of the evaluation process whose purpose is to keep the attention on acquiring a secure software. The CISSP reference which I am studying doesn't cover this specific aspect, rather focuses on single elements of a secure development. Hence, I also relied on sources I found online (https://2015.appsec.eu/wp-content/uploads/2015/09/owasp-appseceu2015-sroka.pdf)
This is a skeleton, but functional, for what could be written about each part of the evaluation process whose purpose is to keep the attention on acquiring a secure software. The CISSP reference which I am studying doesn't cover this specific aspect, rather focuses on single elements of a secure development. Hence, I also relied on sources I found online (https://2015.appsec.eu/wp-content/uploads/2015/09/owasp-appseceu2015-sroka.pdf)