... although this begs the question of however how to organize the other requirements, e.g. for TD, etc.
One approach would be to just have a list of requirements, all of them functional, but individual requirements might have technical sub-requirements (e.g. Security Access Control might have OAuth2 requirement).
... although this begs the question of however how to organize the other requirements, e.g. for TD, etc.
One approach would be to just have a list of requirements, all of them functional, but individual requirements might have technical sub-requirements (e.g. Security Access Control might have OAuth2 requirement).
To discuss.