<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Modern approaches to cybersecurity requirements management for software implementation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sergiy Gnatyuk</string-name>
          <email>s.gnatyuk@kai.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktoriya Sydorenko</string-name>
          <email>v.sydorenko@ukr.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Artem Polozhentsev</string-name>
          <email>artem.polozhentsev@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anatolii Skurativskyi</string-name>
          <email>a.skurativskyi@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kamila Kluczewska-Chmielarz</string-name>
          <email>kamila.kluczewska-chmielarz@uken.krakow.pl</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gabit Shuitenov</string-name>
          <email>shuitenov.g@esil.edu.kzl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Esil University</institution>
          ,
          <addr-line>Astana, A. Zhubanov Str., 7, 010000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State University “Kyiv Aviation Institute”</institution>
          ,
          <addr-line>Liubomyra Huzara Ave., 1, Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of the National Education Commission</institution>
          ,
          <addr-line>Podchorazych Str., 2, Krakow, 30-084</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper examines modern approaches to managing cybersecurity requirements during software implementation. It analyzes the regulatory and legal framework, as well as the scientific sources that govern the protection of information systems. Particular attention is given to classifying cybersecurity requirements as functional or non-functional, formulating them, documenting them, and integrating them into the software development process. The article concludes that cybersecurity requirements management encompasses technical, organizational, and legal aspects, necessitating a systematic approach. The article also considers the role of policies, procedures, technical solutions, and regulations in forming a secure digital environment. The importance of continuous monitoring and updating requirements in consideration of the dynamics of cyber threats is emphasized. Furthermore, it presents best practices for managing cybersecurity requirements, along with recommendations for improving the security level of information systems. These results can be used to improve cybersecurity risk management practices, implement security standards, and develop secure software in the public and private sectors.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;cybersecurity</kwd>
        <kwd>cybersecurity requirements</kwd>
        <kwd>requirements management</kwd>
        <kwd>information systems</kwd>
        <kwd>data protection</kwd>
        <kwd>cyber threats</kwd>
        <kwd>functional requirements</kwd>
        <kwd>non-functional requirements</kwd>
        <kwd>ISO/IEC 27001</kwd>
        <kwd>NIST</kwd>
        <kwd>security policy</kwd>
        <kwd>governance policy</kwd>
        <kwd>requirements documentation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of research and problem statement</title>
      <p>The rapid development of digital technologies, the growing number of cyber threats, and the tightening
regulatory requirements present new challenges to ensuring reliable cybersecurity in information
systems. One key element of an efective protection system is managing cybersecurity requirements,
which encompasses identifying, formalizing, documenting, implementing, and enforcing requirements.</p>
      <p>In today’s world, where information security is a critical component of an organization’s strategic
resilience, high-quality requirements management is essential for minimizing risk and ensuring regulatory
compliance.</p>
      <p>Organizations frequently face dificulties in managing cybersecurity requirements in practice, such
as a lack of clear criteria for identifying requirements, inconsistencies in regulatory sources, dificulties
integrating requirements into software development processes, and inadequate support during
monitoring and maintenance. Additionally, international and national practices demonstrate significant
variability in their approaches, ranging from formalized methodologies, such as NIST RMF and ISO/IEC
27001, to flexible, adaptive models applied in specific industries. The lack of systematic generalization
of scientific contributions in this field complicates the selection of optimal solutions for various types
of organizations.</p>
      <p>Therefore, a comprehensive analysis of modern approaches to cybersecurity requirements
management is necessary to identify the most efective practices and recommendations. This analysis is
particularly relevant in the context of software implementation, where cybersecurity requirements
must be technically justified and integrated into all phases of the system life cycle.</p>
      <p>This article aims to analyze modern approaches to cybersecurity requirements management in the
context of software implementation.</p>
      <p>To achieve this aim, the following objectives must be achieved:
1. Identify existing cybersecurity requirements, their main sources, and methods of identification.
2. Analyze methods, tools, key steps, and recommendations for documenting cybersecurity
requirements.
3. Explore the stages of implementation, monitoring, and maintenance, as well as recommendations
for implementing cybersecurity requirements.
4. Identify best practices in cybersecurity requirements management.</p>
      <p>5. Examine the current state of scientific approaches to cybersecurity requirements management.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Definition of cybersecurity requirements</title>
      <p>
        Cybersecurity requirements are defined as the conditions and constraints that must be met to protect
information systems from unauthorized access, modification, disclosure, or destruction. The first and
most important stage in ensuring an organization’s security is defining cybersecurity requirements.
Mathematical methods and algorithms, as presented in works [
        <xref ref-type="bibr" rid="ref1 ref10 ref11 ref2 ref3 ref4 ref5 ref6 ref7 ref8 ref9">1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11</xref>
        ], can be used
to formally represent these requirements.
      </p>
      <sec id="sec-3-1">
        <title>3.1. Key Sources of cybersecurity requirements</title>
        <p>Cybersecurity requirements may originate from various sources, including:
1. Legislative and regulatory acts of Ukraine:
• Law of Ukraine "On the Basic Principles of Ensuring Cybersecurity of Ukraine": This law
establishes the core principles, objectives, and directions of the state policy in the field of
cybersecurity.
• Law of Ukraine "On Information Protection in Information and Telecommunication Systems":
a law that defines the principles of information protection in information and
telecommunication systems.
• DSTU ISO/IEC 27001: The national Ukrainian standard aligned with the international
ISO/IEC 27001 standard that establishes requirements for an Information Security
Management System (ISMS).</p>
        <sec id="sec-3-1-1">
          <title>2. Standards and best practices:</title>
          <p>
            • ISO/IEC 27001: An international standard that defines the requirements for an Information
Security Management System (ISMS). It includes provisions for establishing, implementing,
maintaining, and continuously improving the ISMS [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ].
• GDPR (General Data Protection Regulation): the General Data Protection Regulation of the
European Union sets requirements for the protection of personal data and privacy for all
organizations processing the data of EU residents [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ].
• NIST (National Institute of Standards and Technology) Cybersecurity Framework: a
cybersecurity framework developed by NIST that provides guidance on managing cybersecurity
risks. It is widely used in the U.S. and internationally [
            <xref ref-type="bibr" rid="ref14">14</xref>
            ].
• CISA (Cybersecurity Information Sharing Act): a U.S. law encouraging the sharing of
cybersecurity threat information between the government and the private sector to enhance
cybersecurity [
            <xref ref-type="bibr" rid="ref15">15</xref>
            ].
• HIPAA (Health Insurance Portability and Accountability Act): a U.S. law that defines
requirements for protecting the privacy and security of electronic health information [
            <xref ref-type="bibr" rid="ref16">16</xref>
            ].
• FISMA (Federal Information Security Management Act): A U.S. law that establishes
requirements for protecting information systems in federal agencies [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ].
• NIS Directive: an EU directive that establishes measures to achieve a high level of security
for networks and information systems across the Union [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ].
• ePrivacy Directive: a directive that regulates the processing of personal data and the
protection of privacy in the electronic communications sector [19].
          </p>
        </sec>
        <sec id="sec-3-1-2">
          <title>3. Organizational policies and procedures:</title>
          <p>Organizational policies and procedures are essential for defining and ensuring cybersecurity
requirements. These policies and procedures create a framework for managing cyber risks,
ensuring compliance with regulatory requirements, and implementing efective security measures
(see Figure 1).</p>
          <p>The following are the main policies and procedures that can be implemented in an organization
to ensure cybersecurity:</p>
        </sec>
        <sec id="sec-3-1-3">
          <title>a) Information Security Policy</title>
          <p>
            This policy outlines the fundamental principles and strategies for protecting the
organization’s information assets. It addresses aspects such as the confidentiality, integrity, and
availability of information [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ]. Key elements:
• Defining responsibility for ensuring information security
• Classification of information assets and definition of access levels
• Ensuring network and system security
• Protection against malicious software
          </p>
        </sec>
        <sec id="sec-3-1-4">
          <title>b) Risk Management Policy</title>
          <p>
            This policy aims to identify, assess, and manage cybersecurity risks [
            <xref ref-type="bibr" rid="ref14">14</xref>
            ]. Key elements:
• Risk assessment procedures
• Identification and implementation of risk mitigation measures
• Regular review and updating of risk assessments
          </p>
        </sec>
        <sec id="sec-3-1-5">
          <title>c) Access Control Policy</title>
          <p>This policy regulates access to the organization’s information systems and data, ensuring
that only authorized users can access them. Key elements:
• Requirements for authentication and authorization
• Management of roles and permissions
• Access monitoring and audit procedures</p>
        </sec>
        <sec id="sec-3-1-6">
          <title>d) Incident Response Policy</title>
          <p>This policy outlines the procedures for responding to information security incidents,
including cyberattacks, data breaches, and other security violations. Key elements:
• Defining incident types and classification criteria
• Incident reporting procedures
• Response actions and recovery procedures</p>
        </sec>
        <sec id="sec-3-1-7">
          <title>e) Change Management Policy</title>
          <p>This policy ensures control over changes to information systems, guaranteeing their security
and stability [20, 22]. Key elements:
• Change request and approval procedures
• Security impact assessment of changes
• Testing and documentation of changes</p>
        </sec>
        <sec id="sec-3-1-8">
          <title>f) Training and Awareness Policy</title>
          <p>This policy aims to increase employee awareness of cybersecurity and prepare them to
comply with security policies and procedures. Key elements:
• Regular cybersecurity training sessions
• Awareness campaigns on emerging threats
• Evaluation of training program efectiveness</p>
        </sec>
        <sec id="sec-3-1-9">
          <title>g) Data Retention and Disposal Policy</title>
          <p>
            This policy defines the requirements for retaining and disposing of data, ensuring the
protection of confidential information throughout its life cycle [
            <xref ref-type="bibr" rid="ref13">13, 21</xref>
            ]. Key elements:
• Defining data retention periods
• Secure data disposal procedures
• Backup storage requirements
          </p>
          <p>The following table (Table 1) presents the results of the study on organizational policies and procedures
for ensuring cybersecurity requirements, based on the following criteria:
• Risk Management (RISK) — if the policy aims to identify, assess, and mitigate cyber risks.
• Access Control (ACCN) — if the policy defines rules for authentication, authorization, and user
roles.
• Incident Response (RESP) — if the policy covers the detection, response, and recovery of cyber
incidents.
• Data Handling (DATA) — if the policy includes provisions for data retention, backup, and disposal.
• Awareness &amp; Training (TRNG) — if the policy includes educational programs, training sessions,
and staf knowledge assessments.
• Change Management (CHNG) — if the policy establishes rules for making secure changes to
systems and processes.</p>
          <p>The analysis shows that the Information Security Policy is the most comprehensive because it
addresses most of the criteria, at least partially. The Risk Management and Incident Response Policies
provide targeted support in specific areas, but none of them take into account important components
such as staf training or access control. These findings underscore the necessity of a holistic approach
to developing cybersecurity policies that consider interrelated requirements.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Technical specifications and architectural solutions</title>
        <p>Technical specifications and architectural solutions play a critical role in ensuring cybersecurity by
defining and implementing the technical mechanisms required to protect systems, data, and
communications. This section outlines key specifications and architectures that support cybersecurity requirements
implementation in organizations.
1. Technical Specifications
a. Data Encryption
Encryption safeguards data confidentiality both in transit and at rest.</p>
        <p>• AES (Advanced Encryption Standard): A symmetric encryption algorithm widely adopted for
securing sensitive information due to its strength and speed.
• TLS (Transport Layer Security): A cryptographic protocol that ensures secure communication
over networks, particularly the Internet.</p>
        <p>b. Authentication and Authorization
These mechanisms control access to systems and data, ensuring that only authorized individuals can
perform actions.</p>
        <p>• MFA (Multi-Factor Authentication): Combines two or more independent credentials (e.g.,
password, phone verification, biometric) for user identity verification.
• OAuth: A widely used open standard for access delegation, enabling secure authorization without
exposing user credentials.</p>
        <p>c. Vulnerability Management
Timely identification and mitigation of vulnerabilities is vital for reducing the risk of exploitation.
• CVSS (Common Vulnerability Scoring System): A standardized method for evaluating the
severity of software vulnerabilities.
• Nessus: A robust vulnerability scanner used to identify weaknesses across systems and
applications.
2. Architectural Solutions
a. Network Security
Protecting the integrity and confidentiality of network communications is fundamental.
• DMZ (Demilitarized Zone): A network segment that isolates internal systems from untrusted
external networks, adding an extra layer of protection.
• VPN (Virtual Private Network): Encrypts data transmission across public or untrusted
networks, maintaining confidentiality and integrity.</p>
        <p>b. Endpoint Protection
Endpoints such as laptops, servers, and mobile devices must be secured against malware and
unauthorized access.</p>
        <p>• EDR (Endpoint Detection and Response): Provides continuous monitoring and response
capabilities to detect and counteract endpoint threats.</p>
        <p>• Antivirus Software: Prevents, detects, and removes malicious software from endpoint devices.
c. Application Security
Secure development practices and application-level controls are essential to prevent exploits.
• OWASP (Open Web Application Security Project): Provides a framework and tools for
developing secure web applications.
• SAST (Static Application Security Testing): Analyzes source code or binaries to identify
security vulnerabilities without executing the code.</p>
        <p>d. Monitoring and Logging
Efective monitoring and centralized logging are essential for detecting and investigating security
events.</p>
        <p>• SIEM (Security Information and Event Management): Aggregates and correlates security
data to identify anomalies and generate alerts.
• Syslog: A standard protocol used for forwarding log messages, enabling centralized logging and
analysis.</p>
        <p>e. Cloud Cybersecurity Solutions
Securing cloud-based infrastructure, applications, and data requires specialized solutions.
• CASB (Cloud Access Security Broker): Enforces security policies between users and cloud
applications to monitor usage and enforce controls.
• MSS (Managed Security Services): Outsourced security services that monitor and protect cloud
environments through continuous threat management.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Requirements identification</title>
        <p>After identifying the requirements, they must be thoroughly analyzed to detect potential conflicts,
duplications, or gaps. The analysis includes evaluating the requirements’ practicability, clarity, verifiability,
and priority.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Analysis and documentation of requirements</title>
      <p>Once the requirements have been identified, they should be thoroughly analyzed to identify
possible conflicts, overlaps, and gaps. Analyzing requirements includes assessing their feasibility, clarity,
verifiability, and prioritization.</p>
      <sec id="sec-4-1">
        <title>4.1. Categorization of requirements</title>
        <p>Requirements can be classified into various categories, such as functional and non-functional
requirements.
4.1.1. Functional requirements
Functional cybersecurity requirements define the specific features and capabilities that must be
implemented in systems to ensure security. These requirements encompass a wide range of measures aimed
at protecting confidentiality, integrity, and availability. The key functional cybersecurity requirements
are listed below [23].</p>
        <p>1. Authentication and Authorization
• Authentication:
– Multi-factor authentication (MFA): Use of multiple authentication methods (e.g.,
password and biometric data or token).</p>
        <p>– Single Sign-On (SSO): Single login for access to multiple systems.
• Authorization:
– Role-Based Access Control (RBAC): Access based on user roles.
– Attribute-Based Access Control (ABAC): Access based on user attributes like location
or time.
2. Data Protection
• Encryption:
– Data at Rest Encryption
– Data in Transit Encryption (e.g., TLS)
• Data Masking: Masking sensitive data to protect confidentiality.
3. Incident Detection and Response
• Intrusion Detection Systems (IDS):
– Network IDS (NIDS)
– Host-based IDS (HIDS)
• Intrusion Prevention Systems (IPS):
– Network IPS (NIPS)
– Host-based IPS (HIPS)
4. Access Management
• Identity Lifecycle Management
• Access Auditing
• Password Policies
5. Endpoint Protection
• Antivirus Software
• Anti-spam Filters
• Firewalls
6. Application Security
• Secure Software Development
• Security Testing
• Web Application Firewalls (WAF)</p>
        <sec id="sec-4-1-1">
          <title>7. Configuration and Change Management</title>
          <p>
            • Configuration Change Tracking
• Configuration Compliance
• Change Procedures
• Security Impact Assessment
4.1.2. Non-functional requirements
Non-functional cybersecurity requirements describe the system’s characteristics and attributes that are
not directly related to its functionality, yet critical to its overall security, reliability, performance, and
usability [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ].
          </p>
          <p>1. Performance and Scalability
• Response Time
• Throughput
• Horizontal and Vertical Scalability
2. Reliability and Recoverability
• Fault Tolerance
• Operational Continuity
• Recovery Procedures
• Backup and Restore
3. Security Assurance
• Confidentiality: Data Encryption
• Integrity: Data Integrity Control
• Availability: DDoS Protection, High Availability</p>
        </sec>
        <sec id="sec-4-1-2">
          <title>4. Usability</title>
          <p>• Ease of Use: Interface, Documentation, Training
• Automation: Automatic Updates, Automated Detection and Response</p>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Documentation of requirements</title>
        <p>Documenting requirements is essential for ensuring clarity and successful implementation. The key
steps and recommendations for documenting cybersecurity requirements within an organization are
outlined below.
4.2.1. Steps for documenting cybersecurity requirements
The following step-by-step approach ofers a practical way to organize and formalize these requirements
within an organization:</p>
        <sec id="sec-4-2-1">
          <title>Step 1: Requirements identification</title>
          <p>The first step in documenting cybersecurity requirements is collecting all relevant requirements from
various sources:
• Legislative and regulatory acts: Requirements established by government authorities and industry
standards (e.g., GDPR, ISO/IEC 27001).
• Organizational policies and procedures: Internal documents that define the organization’s approach
to information security management.
• Technical specifications and architectural solutions: Requirements derived from technical and
system architecture decisions.</p>
        </sec>
        <sec id="sec-4-2-2">
          <title>Step 2: Requirements analysis and alignment</title>
          <p>After gathering the requirements, they must be analyzed and aligned with all stakeholders:
• Conflict and duplication detection: Identify and resolve potential conflicts or overlaps between
requirements.
• Requirements prioritization: Determine the priority of the requirements based on their importance
and impact on security.</p>
        </sec>
        <sec id="sec-4-2-3">
          <title>Step 3: Requirements structuring</title>
          <p>Structure cybersecurity requirements to facilitate ease of use and management:
• Categorization: Group requirements into categories (e.g., authentication, authorization,
encryption, and access control).</p>
          <p>• Hierarchical structure: Define a hierarchy to track dependencies between requirements.</p>
        </sec>
        <sec id="sec-4-2-4">
          <title>Step 4: Requirements documentation</title>
          <p>Documenting requirements involves creating detailed descriptions that contain all the necessary
information:
• Requirement title: A short name reflecting the essence of the requirement.
• Requirement description: A detailed explanation of the requirement, its purpose, and the expected
outcome.
• Acceptance criteria: The conditions under which the requirement is considered fulfilled.
• Priority: An indication of the requirement’s priority (e.g., high, medium, or low).
• Responsible parties: The designation of the individuals or departments responsible for
implementation and monitoring.</p>
        </sec>
        <sec id="sec-4-2-5">
          <title>Step 5: Requirements review and approval</title>
          <p>After the documentation is complete, the requirements must be reviewed and formally approved:
• Stakeholder review: Coordinate the documents with all relevant stakeholders, including the IT
department, management, and the legal team.</p>
          <p>• Approval: The organization’s leadership must oficially approve the documents.
4.2.2. Recommendations for documenting cybersecurity requirements
To efectively communicate, implement, and maintain cybersecurity requirements, organizations should
follow a set of practical documentation principles:
1. The usage of standards and templates:
• Use standardized templates to ensure consistency and clarity in requirement documentation.
• Follow international standards, such as ISO/IEC 27001, to maintain high-quality
documentation.
2. Transparency and accessibility:
3. Regular updates:
• Ensure documents are accessible to all relevant stakeholders.
• Maintain a centralized repository for easy access to and updates of the requirements.
• Periodically review and update cybersecurity requirements in response to changes in
legislation, technology, and business processes.
4. Training and awareness:
5. Use requirements management tools:
• Implement mechanisms for rapid updates in case of newly identified threats or
vulnerabilities.
• Conduct staf training on the importance and content of cybersecurity requirements.
• Ensure that all employees understand their responsibilities regarding compliance with these
requirements.
• Use specialized tools for requirements management that enable efective tracking, analysis,
and reporting on implementation progress.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Implementation, monitoring, and maintenance of cybersecurity requirements</title>
      <p>The implementation of cybersecurity requirements involves developing, testing, and integrating security
measures into an organization’s information systems. This includes:
• Developing technical solutions that meet the defined requirements;
• Conducting tests to verify fulfillment of requirements;
• Integrating the solutions into existing systems and processes.</p>
      <p>Monitoring and maintaining cybersecurity requirements are ongoing processes that include:
• Ongoing system monitoring to detect and respond to emerging threats;
• Updating requirements and solutions in response to changes in the technological environment
and threat landscape;
• Conducting regular audits and security assessments.</p>
      <p>Implementing cybersecurity requirements is a critical step in reliably protecting the organization’s
information systems and data. This process involves developing and integrating appropriate technical
and organizational measures to fulfill documented requirements. The following are key steps and
recommendations for implementing cybersecurity requirements (see Fig. 2).</p>
      <sec id="sec-5-1">
        <title>5.1. Recommendations for implementing cybersecurity requirements</title>
        <p>The following recommendations outline the key actions necessary for the efective execution of
cybersecurity policies and technical controls:</p>
        <sec id="sec-5-1-1">
          <title>1. Integrate security across all stages of the system lifecycle: Ensure that cybersecurity</title>
          <p>requirements are incorporated at every stage of system development and operation, from initial
planning to decommissioning.
2. Adopt best practices and standards: Follow established best practices and frameworks such as</p>
          <p>NIST, ISO/IEC 27001 to achieve a high level of security assurance.
3. Conduct regular assessments and improvements: Perform periodic evaluations of the
effectiveness of implemented controls and adjust them in response to emerging threats and new
technologies.
4. Engage stakeholders: Involve management, IT personnel, and end users in the implementation
and monitoring of cybersecurity measures to ensure understanding and support.
5. Use automated tools: Leverage automation for monitoring, analysis, and incident response to
improve eficiency, accuracy, and timeliness.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Best practices in cybersecurity requirements management</title>
      <sec id="sec-6-1">
        <title>6.1. Best practices in cybersecurity</title>
        <p>1. The use of standardized methodologies and tools for managing cybersecurity
requirements.</p>
        <p>These methodologies are key to ensuring process efectiveness and consistency within an
organization. They provide structured approaches through systematic planning, transparency, and
regulatory compliance. Tools automate and optimize processes, thereby increasing eficiency.
Standardized methodologies include:
• ISO/IEC 27001
• NIST Cybersecurity Framework (CSF)
• COBIT (Control Objectives for Information and Related Technologies)
• ITIL (Information Technology Infrastructure Library)</p>
        <sec id="sec-6-1-1">
          <title>2. Active engagement with all stakeholders.</title>
        </sec>
        <sec id="sec-6-1-2">
          <title>3. Regular training and upskilling of personnel.</title>
        </sec>
        <sec id="sec-6-1-3">
          <title>4. Ensuring transparency and documentation of all processes.</title>
        </sec>
      </sec>
      <sec id="sec-6-2">
        <title>6.2. Overview of tools for managing cybersecurity requirements</title>
        <p>1. Jira is a popular tool for project and requirements management that allows efective tracking of
tasks and cybersecurity requirements.</p>
        <p>Functionality: Task tracking, project management, integration with other tools.</p>
        <p>Advantages: Flexibility, customization, support for Agile and Scrum methodologies.
2. Confluence is used to create, share, and manage documentation, including cybersecurity
requirements.</p>
        <p>Functionality: Collaborative documentation, structured information storage, integration with Jira.</p>
        <p>Advantages: Ease of use, real-time collaboration, centralized documentation storage.
3. ServiceNow supports IT service management, including cybersecurity and requirements
management.</p>
        <p>Functionality: Incident management, change management, configuration management.</p>
        <p>Advantages: Process integration, automation, analytics, and reporting.
4. RSA Archer is a risk management platform that enables organizations to manage risks and
regulatory compliance.</p>
        <p>Functionality: Risk management, compliance, audits, security incident tracking.</p>
        <p>Advantages: Broad functionality, scalability, integration with other systems.
5. Tenable provides tools for vulnerability management and ensuring compliance with security
requirements.</p>
        <p>Functionality: Vulnerability scanning, security monitoring, reporting.</p>
        <p>Advantages: Detailed vulnerability analysis, integration with other security systems, regularly
updated threat databases.</p>
        <p>A detailed analysis of these cybersecurity requirements management tools was also conducted by
the authors (see Table 2) based on the following criteria:
• FUNC: Functionality for cybersecurity requirements management;
• INTG: Integration with external systems;
• USAB: Usability;
• CYBO: Cybersecurity-specific functionality;
• CONF: Configuration flexibility;
• ANRE: Analytics and reporting.</p>
        <p>Based on the comparative analysis, it can be concluded that none of the tools under consideration
fully cover cybersecurity management requirements. Jira and ServiceNow stand out for their flexibility,
integration capabilities, and suitability for an Agile environment. However, they have a limited focus
on security aspects. RSA Archer and Tenable have a clear focus on risk and vulnerability management,
but are less convenient for Agile requirements management and team collaboration. Confluence, on
the other hand, is a convenient documentation tool, but it lacks extensive capabilities for automating
cybersecurity processes. Therefore, the choice of tool should be based on project specifics, risk level,
and organizational needs — often, a combination of several platforms is advisable.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>7. Analysis of modern scientific approaches to cybersecurity requirements management</title>
      <p>Let us take a closer look at the current state of scientific research in this field.</p>
      <p>Syrovatchenko’s work [24] analyzes the legal aspects of ensuring cybersecurity in Ukraine, including
an assessment of statistical data on the cyber environment and the role of national and international
legislation in countering cyber threats. The author emphasizes the need to improve the legislative
framework and international cooperation in cybersecurity.</p>
      <p>In [25], Khudolii examines current challenges in Ukraine’s cybersecurity landscape, including threats
arising from digitalization and hybrid warfare. The author analyzes the Ukrainian government’s
measures to improve cybersecurity and proposes recommendations to enhance the protection system.</p>
      <p>Tsvilii [26] investigates the cybersecurity certification system for ICT as a key element in securing
the digital economy and public administration. The author analyzes existing certification standards and
procedures and proposes improvements.</p>
      <p>Trofymenko et al. [27] identify political, scientific, technical, organizational, and educational issues
that must be addressed as part of a comprehensive response to cyber threats. The authors analyze the
current state of cybersecurity in Ukraine and ofer recommendations for improvement.</p>
      <p>Admass, Munaye, and Diro [28] provide a review of the global cybersecurity landscape, including
challenges, tactics, conditions, and trends. They highlight threats such as deepfake-based attacks and
the need to adapt requirements management strategies accordingly.</p>
      <p>Kim, Park, and Lee [29] present a Cybersecurity Requirements Management System (CRMS) as
a framework for analyzing security requirements in the automotive industry. The system supports
early-stage identification and implementation of security measures.</p>
      <p>In [30], Cremer, Sheehan, and Smith explore the limitations of existing cyber risk management
approaches, emphasizing the lack of accessible cyber risk data, which hampers efective
decisionmaking and policy development.</p>
      <p>Nguyen, Tran, and Le [31] provide an overview of cybersecurity in emerging technologies. They
underline the need to integrate requirements management into early phases of tech implementation
and identify associated risks.</p>
      <p>Summary: The analysis of recent publications shows that current approaches to cybersecurity
requirements management emphasize the need to improve regulatory frameworks, adopt industry-specific
standards, integrate cyber risk management, and standardize security processes. Studies from Ukraine
and globally highlight the importance of interdisciplinary strategies, international alignment, and the
use of threat intelligence to ensure informed decision-making. Efective cybersecurity management is
recognized as a multifaceted process involving legal, technical, and organizational elements.</p>
    </sec>
    <sec id="sec-8">
      <title>8. Conclusions</title>
      <p>This study analyzed modern approaches to cybersecurity requirements management in the context of
software implementation. Cybersecurity requirements management is crucial for reliably protecting
organizational information systems. Efectively identifying, analyzing, documenting, and implementing
such requirements helps minimize risk and ensure regulatory compliance.</p>
      <p>Legislative and regulatory acts play a key role in shaping secure digital ecosystems by providing clear
organizational obligations. Compliance with these laws reduces risks and strengthens cybersecurity.</p>
      <p>Developing and enforcing cybersecurity policies and procedures is vital for efective cyber risk
management and alignment with legal requirements. Regularly updating these policies ensures adaptation
to an evolving threat landscape.</p>
      <p>Technical specifications and architectural solutions provide foundational tools for protecting systems
from cyber threats. Their continuous improvement is necessary to meet changing conditions and
address emerging risks.</p>
      <p>Functional cybersecurity requirements target specific technical and organizational measures to
safeguard systems and data. Their implementation improves risk posture, enhances security, and
ensures regulatory compliance.</p>
      <p>Non-functional cybersecurity requirements define performance and reliability attributes such as
availability, scalability, and maintainability. These characteristics are essential for the secure and stable
operation of systems.</p>
      <p>Documenting cybersecurity requirements supports structured implementation and monitoring.
Adopting best practices and using modern tools ensures consistency, traceability, and compliance.</p>
      <p>Implementing cybersecurity requirements involves multiple phases: designing, testing, integrating
solutions, staf training, and ongoing monitoring. Following best practices and continuously improving
implemented measures allows organizations to respond efectively to threats and maintain a high level
of protection.</p>
    </sec>
    <sec id="sec-9">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.
[19] European Parliament and Council, Directive on privacy and electronic communications (eprivacy
directive), 2002. Consolidated 2009.
[20] M. Zaliskyi, et al., Heteroskedasticity analysis during operational data processing of radio electronic
systems, in: S. Shukla, A. Unal, J. V. Kureethara, D. Mishra, D. Han (Eds.), Data Science and
Security, volume 290 of Lecture Notes in Networks and Systems, Springer, 2021, pp. 168–175.
doi:10.1007/978-981-16-4486-3_18.
[21] Y. Averyanova, et al., UAS cyber security hazards analysis and approach to qualitative assessment,
in: S. Shukla, A. Unal, J. V. Kureethara, D. Mishra, D. Han (Eds.), Data Science and Security,
volume 290 of Lecture Notes in Networks and Systems, Springer, Singapore, 2021, pp. 258–265.
doi:10.1007/978-981-16-4486-3_28.
[22] I. Ostroumov, et al., Relative navigation for vehicle formation movement, in: IEEE 3rd KhPI Week
on Advanced Technology, 2022, pp. 1–4. doi:10.1109/KhPIWeek57572.2022.9916414.
[23] QATestLab, Non-functional requirements: Examples, types,
approaches, n.d. URL: https://training.qatestlab.com/blog/technical-articles/
non-functional-requirements-examples-types-approaches.
[24] O. Syrovatchenko, Legal aspects of ensuring cybersecurity in ukraine, Law Herald (2024) 78–85.
[25] A. Khudolii, Cybersecurity: Current challenges facing ukraine, Acta De Historia &amp; Politica:</p>
      <p>Saeculum XXI (2019) 138–146.
[26] O. O. Tsvilii, Cybersecurity certification system for ict, Scientific Works of O.S. Popov ONAZ
(2020) 121–126.
[27] O. H. Trofymenko, Y. V. Prokop, N. I. Lohinova, O. V. Zadereiko, Cybersecurity in ukraine: Analysis
of the current state, Information Protection 21 (2019) 3–12.
[28] W. S. Admass, Y. Y. Munaye, A. A. Diro, Cyber security: State of the art, challenges and
future directions, Cyber Security and Applications 2 (2024). URL: https://www.scirp.org/journal/
paperinformation.aspx?paperid=129715, article ID: 100031.
[29] H. Kim, J. Park, S. Lee, A framework for cybersecurity requirements management in the automotive
industry, Sensors 23 (2023) 4979. doi:10.3390/s23104979.
[30] S. Cremer, B. Sheehan, J. Smith, Cyber risk and cybersecurity: A systematic review of data
availability, Global Policy and Public Risk 47 (2022) 123–139.
[31] T. T. Nguyen, M. H. Tran, D. H. Le, Managing cybersecurity risks in emerging technologies,
Journal of Emerging Technologies 5 (2023) 89–102.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>L.</given-names>
            <surname>Li</surname>
          </string-name>
          , et al.,
          <article-title>Logicedu: Enhancing computational logic understanding through web-based boolean logic simplification tool</article-title>
          ,
          <source>in: 2024 21st International SoC Design Conference (ISOCC)</source>
          ,
          <year>2024</year>
          , pp.
          <fpage>390</fpage>
          -
          <lpage>391</lpage>
          . doi:
          <volume>10</volume>
          .1109/ISOCC62682.
          <year>2024</year>
          .
          <volume>10762040</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Deepak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Shah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Chetan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Sharda</surname>
          </string-name>
          ,
          <article-title>New decision-making process based on set theory: Towards application of set theory</article-title>
          ,
          <source>in: 2023 IEEE Int. Conf. on ICT in Business Industry &amp; Government (ICTBIG)</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICTBIG59752.
          <year>2023</year>
          .
          <volume>10456045</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Network graph theory and organization model analysis based on mathematical modeling with the dynamic systematic data perspective</article-title>
          ,
          <source>in: 2022 6th Int. Conf. on Trends in Electronics and Informatics (ICOEI)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>915</fpage>
          -
          <lpage>919</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICOEI53556.
          <year>2022</year>
          .
          <volume>9776767</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>A bayesian model averaging method for software reliability assessment</article-title>
          ,
          <source>in: 2020 Asia-Pacific Int. Symp. on Advanced Reliability and Maintenance Modeling (APARM)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/APARM49247.
          <year>2020</year>
          .
          <volume>9209504</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O.</given-names>
            <surname>Okoro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaliskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dmytriiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Sribna</surname>
          </string-name>
          ,
          <article-title>Optimization of maintenance task interval of aircraft systems</article-title>
          ,
          <source>International Journal of Computer Network and Information Security</source>
          <volume>14</volume>
          (
          <year>2022</year>
          )
          <fpage>77</fpage>
          -
          <lpage>89</lpage>
          . doi:
          <volume>10</volume>
          .5815/ijcnis.
          <year>2022</year>
          .
          <volume>02</volume>
          .07.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>B.</given-names>
            <surname>Yang</surname>
          </string-name>
          , et al.,
          <article-title>A critical and comprehensive handbook for game theory applications on new power systems: Structure, methodology, and challenges</article-title>
          ,
          <source>Protection and Control of Modern Power Systems</source>
          (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .23919/PCMP.
          <year>2024</year>
          .
          <volume>000297</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P.</given-names>
            <surname>Shukla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Khamparia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Goyal</surname>
          </string-name>
          ,
          <article-title>Nature-inspired optimization techniques, in: Nature-Inspired Optimization Algorithms</article-title>
          , De Gruyter,
          <year>2023</year>
          , pp.
          <fpage>137</fpage>
          -
          <lpage>152</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Beniwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <article-title>Metaheuristics approaches towards secure and optimized routing in iot: A systematic literature review</article-title>
          ,
          <source>in: 2024 Int. Conf. on Electrical Electronics and Computing Technologies (ICEECT)</source>
          ,
          <year>2024</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICEECT61758.
          <year>2024</year>
          .
          <volume>10739076</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>T. T.</given-names>
            <surname>Zin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S. T.</given-names>
            <surname>Moe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. N.</given-names>
            <surname>Phyo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Tin</surname>
          </string-name>
          ,
          <article-title>Fusion of strategic queueing theory and ai for smart city telecommunication system</article-title>
          ,
          <source>in: 2024 IEEE 21st Int. Conf. on Mobile Ad-Hoc and Smart Systems (MASS)</source>
          ,
          <year>2024</year>
          , pp.
          <fpage>653</fpage>
          -
          <lpage>657</lpage>
          . doi:
          <volume>10</volume>
          .1109/MASS62177.
          <year>2024</year>
          .
          <volume>00104</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , Y. Liu, W. Mao,
          <article-title>Application of fault tree analysis for reliability evaluation and weak link identification</article-title>
          ..., in: 2021
          <source>IEEE Sustainable Power and Energy Conf. (iSPEC)</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>4209</fpage>
          -
          <lpage>4214</lpage>
          . doi:
          <volume>10</volume>
          .1109/iSPEC53008.
          <year>2021</year>
          .
          <volume>9735815</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Jeon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. C.</given-names>
            <surname>Koo</surname>
          </string-name>
          ,
          <article-title>Addressing timely ai technology standardization challenges through a hierarchical analysis approach</article-title>
          ,
          <source>in: 2023 14th Int. Conf. on ICT Convergence (ICTC)</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>1431</fpage>
          -
          <lpage>1433</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICTC58733.
          <year>2023</year>
          .
          <volume>10393654</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12] ISO/IEC, Information security, cybersecurity and privacy protection - isms - requirements,
          <year>2022</year>
          . doi:
          <volume>10</volume>
          .3403/30514785, iSO/IEC 27001:
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>European</given-names>
            <surname>Parliament</surname>
          </string-name>
          and Council,
          <article-title>General data protection regulation (gdpr</article-title>
          ),
          <year>2016</year>
          . Regulation (EU)
          <year>2016</year>
          /679.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <article-title>National Institute of Standards and Technology</article-title>
          ,
          <source>Cybersecurity framework 2.0</source>
          ,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .6028/ NIST.CSWP.
          <volume>02022024</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>U.S.</given-names>
            <surname>Congress</surname>
          </string-name>
          ,
          <article-title>Cybersecurity information sharing act (cisa</article-title>
          ),
          <year>2015</year>
          . Public Law No:
          <fpage>114</fpage>
          -
          <lpage>113</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>U.S.</given-names>
            <surname>Dept</surname>
          </string-name>
          .
          <article-title>of Health and Human Services, Health insurance portability and accountability act (hipaa</article-title>
          ),
          <year>2024</year>
          .
          <source>Amended</source>
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>U.S.</given-names>
            <surname>Congress</surname>
          </string-name>
          ,
          <article-title>Federal information security modernization act (fisma</article-title>
          ) of
          <year>2014</year>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>European</given-names>
            <surname>Parliament</surname>
          </string-name>
          and Council,
          <source>Directive (eu)</source>
          <year>2022</year>
          <article-title>/2555 on a high common level of cybersecurity</article-title>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>