SC.L2-3.13.2—Security Engineering
Level 2
800-171: 3.13.2
>Control Description
Employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational systems.
>Cross-Framework Mappings
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What security engineering principles guide your system designs?
- •How do you incorporate security into system development lifecycles?
- •Who is responsible for security architecture and design review?
- •What standards or frameworks guide your security engineering practices?
- •How do you ensure security is considered from the beginning of development?
Technical Implementation:
- •What technologies and tools implement Security Engineering?
- •How do you technically enforce this requirement?
- •What automated mechanisms support this control?
- •What logging or monitoring provides visibility into implementation?
- •How do you verify technical implementation is functioning correctly?
Evidence & Documentation:
- •What network diagrams show boundary protection architecture?
- •What firewall rule sets and configurations can you provide?
- •What encryption implementation documentation shows FIPS-validated crypto?
- •What key management procedures can you provide?
- •What network segmentation documentation shows proper separation?
- •What evidence shows cryptographic mechanisms protect CUI?
- •What configuration documentation shows security controls are properly implemented?
Ask AI
Configure your API key to use AI features.