ma-agents 2.16.2 → 2.17.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/bmad-customizations/bmm-mil498.customize.yaml +9 -6
- package/lib/bmad-customizations/mil498.md +7 -6
- package/lib/bmad-workflows/mil498/ocd/instructions.md +99 -0
- package/lib/bmad-workflows/mil498/ocd/workflow.yaml +15 -0
- package/lib/bmad-workflows/mil498/sdd/instructions.md +104 -0
- package/lib/bmad-workflows/mil498/sdd/workflow.yaml +16 -0
- package/lib/bmad-workflows/mil498/sdp/instructions.md +98 -0
- package/lib/bmad-workflows/mil498/sdp/workflow.yaml +15 -0
- package/lib/bmad-workflows/mil498/srs/instructions.md +103 -0
- package/lib/bmad-workflows/mil498/srs/workflow.yaml +15 -0
- package/lib/bmad-workflows/mil498/ssdd/instructions.md +118 -0
- package/lib/bmad-workflows/mil498/ssdd/workflow.yaml +15 -0
- package/lib/bmad-workflows/mil498/sss/instructions.md +96 -0
- package/lib/bmad-workflows/mil498/sss/workflow.yaml +15 -0
- package/lib/bmad-workflows/mil498/std/instructions.md +97 -0
- package/lib/bmad-workflows/mil498/std/workflow.yaml +15 -0
- package/lib/bmad.js +22 -16
- package/package.json +1 -1
- package/.agent/workflows/bmad-agent-bmad-master.md +0 -15
- package/.agent/workflows/bmad-agent-bmm-analyst.md +0 -15
- package/.agent/workflows/bmad-agent-bmm-architect.md +0 -15
- package/.agent/workflows/bmad-agent-bmm-dev.md +0 -15
- package/.agent/workflows/bmad-agent-bmm-pm.md +0 -15
- package/.agent/workflows/bmad-agent-bmm-qa.md +0 -15
- package/.agent/workflows/bmad-agent-bmm-quick-flow-solo-dev.md +0 -15
- package/.agent/workflows/bmad-agent-bmm-sm.md +0 -15
- package/.agent/workflows/bmad-agent-bmm-tech-writer.md +0 -15
- package/.agent/workflows/bmad-agent-bmm-ux-designer.md +0 -15
- package/.agent/workflows/bmad-agent-cis-brainstorming-coach.md +0 -15
- package/.agent/workflows/bmad-agent-cis-creative-problem-solver.md +0 -15
- package/.agent/workflows/bmad-agent-cis-design-thinking-coach.md +0 -15
- package/.agent/workflows/bmad-agent-cis-innovation-strategist.md +0 -15
- package/.agent/workflows/bmad-agent-cis-presentation-master.md +0 -15
- package/.agent/workflows/bmad-agent-cis-storyteller.md +0 -15
- package/.agent/workflows/bmad-bmm-check-implementation-readiness.md +0 -6
- package/.agent/workflows/bmad-bmm-code-review.md +0 -14
- package/.agent/workflows/bmad-bmm-correct-course.md +0 -14
- package/.agent/workflows/bmad-bmm-create-architecture.md +0 -6
- package/.agent/workflows/bmad-bmm-create-epics-and-stories.md +0 -6
- package/.agent/workflows/bmad-bmm-create-prd.md +0 -6
- package/.agent/workflows/bmad-bmm-create-product-brief.md +0 -6
- package/.agent/workflows/bmad-bmm-create-story.md +0 -14
- package/.agent/workflows/bmad-bmm-create-ux-design.md +0 -6
- package/.agent/workflows/bmad-bmm-dev-story.md +0 -14
- package/.agent/workflows/bmad-bmm-document-project.md +0 -14
- package/.agent/workflows/bmad-bmm-domain-research.md +0 -6
- package/.agent/workflows/bmad-bmm-edit-prd.md +0 -6
- package/.agent/workflows/bmad-bmm-generate-project-context.md +0 -6
- package/.agent/workflows/bmad-bmm-market-research.md +0 -6
- package/.agent/workflows/bmad-bmm-qa-generate-e2e-tests.md +0 -14
- package/.agent/workflows/bmad-bmm-quick-dev.md +0 -6
- package/.agent/workflows/bmad-bmm-quick-spec.md +0 -6
- package/.agent/workflows/bmad-bmm-retrospective.md +0 -14
- package/.agent/workflows/bmad-bmm-sprint-planning.md +0 -14
- package/.agent/workflows/bmad-bmm-sprint-status.md +0 -14
- package/.agent/workflows/bmad-bmm-technical-research.md +0 -6
- package/.agent/workflows/bmad-bmm-validate-prd.md +0 -6
- package/.agent/workflows/bmad-brainstorming.md +0 -6
- package/.agent/workflows/bmad-cis-design-thinking.md +0 -14
- package/.agent/workflows/bmad-cis-innovation-strategy.md +0 -14
- package/.agent/workflows/bmad-cis-problem-solving.md +0 -14
- package/.agent/workflows/bmad-cis-storytelling.md +0 -14
- package/.agent/workflows/bmad-editorial-review-prose.md +0 -10
- package/.agent/workflows/bmad-editorial-review-structure.md +0 -10
- package/.agent/workflows/bmad-help.md +0 -10
- package/.agent/workflows/bmad-index-docs.md +0 -10
- package/.agent/workflows/bmad-party-mode.md +0 -6
- package/.agent/workflows/bmad-review-adversarial-general.md +0 -10
- package/.agent/workflows/bmad-review-edge-case-hunter.md +0 -10
- package/.agent/workflows/bmad-shard-doc.md +0 -10
- package/.antigravity/antigravity.md +0 -14
- package/.antigravity/skills/.ma-agents.json +0 -14
- package/.antigravity/skills/MANIFEST.yaml +0 -7
- package/.antigravity/skills/docker-image-signing/SKILL.md +0 -28
- package/.antigravity/skills/docker-image-signing/scripts/sign-image.sh +0 -33
- package/lib/bmad-workflows/mil498/bmad-mil-generate-ocd.md +0 -17
- package/lib/bmad-workflows/mil498/bmad-mil-generate-sdd.md +0 -18
- package/lib/bmad-workflows/mil498/bmad-mil-generate-sdp.md +0 -17
- package/lib/bmad-workflows/mil498/bmad-mil-generate-srs.md +0 -19
- package/lib/bmad-workflows/mil498/bmad-mil-generate-sss.md +0 -16
- package/lib/bmad-workflows/mil498/bmad-mil-generate-std.md +0 -17
- package/mil498/OCD.md +0 -169
- package/mil498/README.md +0 -4
- package/mil498/SDP.md +0 -307
- package/mil498/SRS.md +0 -219
- package/mil498/SSDD.md +0 -154
- package/mil498/SSS.md +0 -225
- package/mil498/STD.md +0 -188
- package/out.txt +0 -0
package/mil498/SRS.md
DELETED
|
@@ -1,219 +0,0 @@
|
|
|
1
|
-
# 1. Scope.
|
|
2
|
-
|
|
3
|
-
This section shall be divided into the following paragraphs.
|
|
4
|
-
|
|
5
|
-
## 1.1 Identification.
|
|
6
|
-
|
|
7
|
-
This paragraph shall contain a full identification of the system and the software to which this document applies, including, as applicable, identification number(s), title(s), abbreviation(s), version number(s), and release number(s).
|
|
8
|
-
|
|
9
|
-
## 1.2 System overview.
|
|
10
|
-
|
|
11
|
-
This paragraph shall briefly state the purpose of the system and the software to which this document applies. It shall describe the general nature of the system and software; summarize the history of system development, operation, and maintenance; identify the project sponsor, acquirer, user, developer, and support agencies; identify current and planned operating sites; and list other relevant documents.
|
|
12
|
-
|
|
13
|
-
## 1.3 Document overview.
|
|
14
|
-
|
|
15
|
-
This paragraph shall summarize the purpose and contents of this document and shall describe any security or privacy considerations associated with its use.
|
|
16
|
-
|
|
17
|
-
# 2. Referenced documents.
|
|
18
|
-
|
|
19
|
-
This section shall list the number, title, revision, and date of all documents referenced in this specification. This section shall also identify the source for all documents not available through normal Government stocking activities.
|
|
20
|
-
|
|
21
|
-
# 3. Requirements.
|
|
22
|
-
|
|
23
|
-
This section shall be divided into the following paragraphs to specify the CSCI requirements, that is, those characteristics of the CSCI that are conditions for its acceptance. CSCI requirements are software requirements generated to satisfy the system requirements allocated to this CSCI. Each requirement shall be assigned a project-unique identifier to support testing and traceability and shall be stated in such a way that an objective test can be defined for it. Each requirement shall be annotated with associated qualification method(s) (see section 4) and traceability to system (or subsystem, if applicable) requirements (see section 5.a) if not provided in those sections. The degree of detail to be provided shall be guided by the following rule: Include those characteristics of the CSCI that are conditions for CSCI acceptance; defer to design descriptions those characteristics that the acquirer is willing to leave up to the developer. If there are no requirements in a given paragraph, the paragraph shall so state. If a given requirement fits into more than one paragraph, it may be stated once and referenced from the other paragraphs.
|
|
24
|
-
|
|
25
|
-
## 3.1 Required states and modes.
|
|
26
|
-
|
|
27
|
-
If the CSCI is required to operate in more than one state or mode having requirements distinct from other states or modes, this paragraph shall identify and define each state and mode. Examples of states and modes include: idle, ready, active, post-use analysis, training, degraded, emergency, backup, wartime, peacetime. The distinction between states and modes is arbitrary. A CSCI may be described in terms of states only, modes only, states within modes, modes within states, or any other scheme that is useful. If no states or modes are required, this paragraph shall so state, without the need to create artificial distinctions. If states and/or modes are required, each requirement or group of requirements in this specification shall be correlated to the states and modes. The correlation may be indicated by a table or other method in this paragraph, in an appendix referenced from this paragraph, or by annotation of the requirements in the paragraphs where they appear.
|
|
28
|
-
|
|
29
|
-
## 3.2 CSCI capability requirements.
|
|
30
|
-
|
|
31
|
-
This paragraph shall be divided into subparagraphs to itemize the requirements associated with each capability of the CSCI. A "capability" is defined as a group of related requirements. The word "capability" may be replaced with "function," "subject," "object," or other term useful for presenting the requirements.
|
|
32
|
-
|
|
33
|
-
### 3.2.x (CSCI capability).
|
|
34
|
-
|
|
35
|
-
This paragraph shall identify a required CSCI capability and shall itemize the requirements associated with the capability. If the capability can be more clearly specified by dividing it into constituent capabilities, the constituent capabilities shall be specified in subparagraphs. The requirements shall specify required behavior of the CSCI and shall include applicable parameters, such as response times, throughput times, other timing constraints, sequencing, accuracy, capacities (how much/how many), priorities, continuous operation requirements, and allowable deviations based on operating conditions. The requirements shall include, as applicable, required behavior under unexpected, unallowed, or "out of bounds" conditions, requirements for error handling, and any provisions to be incorporated into the CSCI to provide continuity of operations in the event of emergencies. Paragraph 3.3.x of this DID provides a list of topics to be considered when specifying requirements regarding inputs the CSCI must accept and outputs it must produce.
|
|
36
|
-
|
|
37
|
-
## 3.3 CSCI external interface requirements.
|
|
38
|
-
|
|
39
|
-
This paragraph shall be divided into subparagraphs to specify the requirements, if any, for the CSCI's external interfaces. This paragraph may reference one or more Interface Requirements Specifications (IRSs) or other documents containing these requirements.
|
|
40
|
-
|
|
41
|
-
### 3.3.1 Interface identification and diagrams.
|
|
42
|
-
|
|
43
|
-
This paragraph shall identify the required external interfaces of the CSCI (that is, relationships with other entities that involve sharing, providing or exchanging data). The identification of each interface shall include a project-unique identifier and shall designate the interfacing entities (systems, configuration items, users, etc.) by name, number, version, and documentation references, as applicable. The identification shall state which entities have fixed interface characteristics (and therefore impose interface requirements on interfacing entities) and which are being developed or modified (thus having interface requirements imposed on them). One or more interface diagrams shall be provided to depict the interfaces.
|
|
44
|
-
|
|
45
|
-
### 3.3.x (Project-unique identifier of interface).
|
|
46
|
-
|
|
47
|
-
This paragraph (beginning with 3.3.2) shall identify a CSCI external interface by project-unique identifier, shall briefly identify the interfacing entities, and shall be divided into subparagraphs as needed to state the requirements imposed on the CSCI to achieve the interface. Interface characteristics of the other entities involved in the interface shall be stated as assumptions or as "When [the entity not covered] does this, the CSCI shall...," not as requirements on the other entities. This paragraph may reference other documents (such as data dictionaries, standards for communication protocols, and standards for user interfaces) in place of stating the information here. The requirements shall include the following, as applicable, presented in any order suited to the requirements, and shall note any differences in these characteristics from the point of view of the interfacing entities (such as different expectations about the size, frequency, or other characteristics of data elements):
|
|
48
|
-
|
|
49
|
-
a. Priority that the CSCI must assign the interface
|
|
50
|
-
|
|
51
|
-
b. Requirements on the type of interface (such as real-time data transfer, storage-and-retrieval of data, etc.) to be implemented
|
|
52
|
-
|
|
53
|
-
c. Required characteristics of individual data elements that the CSCI must provide, store, send, access, receive, etc., such as:
|
|
54
|
-
|
|
55
|
-
1. Names/identifiers
|
|
56
|
-
a. Project-unique identifier
|
|
57
|
-
b. Non-technical (natural language) name
|
|
58
|
-
c. DoD standard data element name
|
|
59
|
-
d. Technical name (e.g., variable or field name in code or database)
|
|
60
|
-
e. Abbreviation or synonymous names
|
|
61
|
-
2. Data type (alphanumeric, integer, etc.)
|
|
62
|
-
3. Size and format (such as length and punctuation of a character string)
|
|
63
|
-
4. Units of measurement (such as meters, dollars, nanoseconds)
|
|
64
|
-
5. Range or enumeration of possible values (such as 0-99)
|
|
65
|
-
6. Accuracy (how correct) and precision (number of significant digits)
|
|
66
|
-
7. Priority, timing, frequency, volume, sequencing, and other constraints, such as whether the data element may be updated and whether business rules apply
|
|
67
|
-
8. Security and privacy constraints
|
|
68
|
-
9. Sources (setting/sending entities) and recipients (using/receiving entities)
|
|
69
|
-
|
|
70
|
-
d. Required characteristics of data element assemblies (records, messages, files, arrays, displays, reports, etc.) that the CSCI must provide, store, send, access, receive, etc., such as:
|
|
71
|
-
|
|
72
|
-
1. Names/identifiers
|
|
73
|
-
a. Project-unique identifier
|
|
74
|
-
b. Non-technical (natural language) name
|
|
75
|
-
c. Technical name (e.g., record or data structure name in code or database)
|
|
76
|
-
d. Abbreviations or synonymous names
|
|
77
|
-
2. Data elements in the assembly and their structure (number, order, grouping)
|
|
78
|
-
3. Medium (such as disk) and structure of data elements/assemblies on the medium
|
|
79
|
-
4. Visual and auditory characteristics of displays and other outputs (such as colors, layouts, fonts, icons and other display elements, beeps, lights)
|
|
80
|
-
5. Relationships among assemblies, such as sorting/access characteristics
|
|
81
|
-
6. Priority, timing, frequency, volume, sequencing, and other constraints, such as whether the assembly may be updated and whether business rules apply
|
|
82
|
-
7. Security and privacy constraints
|
|
83
|
-
8. Sources (setting/sending entities) and recipients (using/receiving entities)
|
|
84
|
-
|
|
85
|
-
e. Required characteristics of communication methods that the CSCI must use for the interface, such as:
|
|
86
|
-
|
|
87
|
-
1. Project-unique identifier(s)
|
|
88
|
-
2. Communication links/bands/frequencies/media and their characteristics
|
|
89
|
-
3. Message formatting
|
|
90
|
-
4. Flow control (such as sequence numbering and buffer allocation)
|
|
91
|
-
5. Data transfer rate, whether periodic/aperiodic, and interval between transfers
|
|
92
|
-
6. Routing, addressing, and naming conventions
|
|
93
|
-
7. Transmission services, including priority and grade
|
|
94
|
-
8. Safety/security/privacy considerations, such as encryption, user authentication, compartmentalization, and auditing
|
|
95
|
-
|
|
96
|
-
f. Required characteristics of protocols the CSCI must use for the interface, such as:
|
|
97
|
-
|
|
98
|
-
1. Project-unique identifier(s)
|
|
99
|
-
2. Priority/layer of the protocol
|
|
100
|
-
3. Packeting, including fragmentation and reassembly, routing, and addressing
|
|
101
|
-
4. Legality checks, error control, and recovery procedures
|
|
102
|
-
5. Synchronization, including connection establishment, maintenance, termination
|
|
103
|
-
6. Status, identification, and any other reporting features
|
|
104
|
-
|
|
105
|
-
g. Other required characteristics, such as physical compatibility of the interfacing entities (dimensions, tolerances, loads, plug compatibility, etc.), voltages, etc.
|
|
106
|
-
|
|
107
|
-
## 3.4 CSCI internal interface requirements.
|
|
108
|
-
|
|
109
|
-
This paragraph shall specify the requirements, if any, imposed on interfaces internal to the CSCI. If all internal interfaces are left to the design, this fact shall be so stated. If such requirements are to be imposed, paragraph 3.3 of this DID provides a list of topics to be considered.
|
|
110
|
-
|
|
111
|
-
## 3.5 CSCI internal data requirements.
|
|
112
|
-
|
|
113
|
-
This paragraph shall specify the requirements, if any, imposed on data internal to the CSCI. Included shall be requirements, if any, on databases and data files to be included in the CSCI. If all decisions about internal data are left to the design, this fact shall be so stated. If such requirements are to be imposed, paragraphs 3.3.x.c and 3.3.x.d of this DID provide a list of topics to be considered.
|
|
114
|
-
|
|
115
|
-
## 3.6 Adaptation requirements.
|
|
116
|
-
|
|
117
|
-
This paragraph shall specify the requirements, if any, concerning installation-dependent data to be provided by the CSCI (such as site-dependent latitude and longitude or site-dependent state tax codes) and operational parameters that the CSCI is required to use that may vary according to operational needs (such as parameters indicating operation-dependent targeting constants or data recording).
|
|
118
|
-
|
|
119
|
-
## 3.7 Safety requirements.
|
|
120
|
-
|
|
121
|
-
This paragraph shall specify the CSCI requirements, if any, concerned with preventing or minimizing unintended hazards to personnel, property, and the physical environment. Examples include safeguards the CSCI must provide to prevent inadvertent actions (such as accidentally issuing an "auto pilot off" command) and non-actions (such as failure to issue an intended "auto pilot off" command). This paragraph shall include the CSCI requirements, if any, regarding nuclear components of the system, including, as applicable, prevention of inadvertent detonation and compliance with nuclear safety rules.
|
|
122
|
-
|
|
123
|
-
## 3.8 Security and privacy requirements.
|
|
124
|
-
|
|
125
|
-
This paragraph shall specify the CSCI requirements, if any, concerned with maintaining security and privacy. These requirements shall include, as applicable, the security/privacy environment in which the CSCI must operate, the type and degree of security or privacy to be provided, the security/privacy risks the CSCI must withstand, required safeguards to reduce those risks, the security/privacy policy that must be met, the security/privacy accountability the CSCI must provide, and the criteria that must be met for security/privacy certification/accreditation.
|
|
126
|
-
|
|
127
|
-
## 3.9 CSCI environment requirements.
|
|
128
|
-
|
|
129
|
-
This paragraph shall specify the requirements, if any, regarding the environment in which the CSCI must operate. Examples include the computer hardware and operating system on which the CSCI must run. (Additional requirements concerning computer resources are given in the next paragraph.)
|
|
130
|
-
|
|
131
|
-
## 3.10 Computer resource requirements.
|
|
132
|
-
|
|
133
|
-
This paragraph shall be divided into the following subparagraphs.
|
|
134
|
-
|
|
135
|
-
### 3.10.1 Computer hardware requirements.
|
|
136
|
-
|
|
137
|
-
This paragraph shall specify the requirements, if any, regarding computer hardware that must be used by the CSCI. The requirements shall include, as applicable, number of each type of equipment, type, size, capacity, and other required characteristics of processors, memory, input/output devices, auxiliary storage, communications/network equipment, and other required equipment.
|
|
138
|
-
|
|
139
|
-
### 3.10.2 Computer hardware resource utilization requirements.
|
|
140
|
-
|
|
141
|
-
This paragraph shall specify the requirements, if any, on the CSCI's computer hardware resource utilization, such as maximum allowable use of processor capacity, memory capacity, input/output device capacity, auxiliary storage device capacity, and communications/network equipment capacity. The requirements (stated, for example, as percentages of the capacity of each computer hardware resource) shall include the conditions, if any, under which the resource utilization is to be measured.
|
|
142
|
-
|
|
143
|
-
### 3.10.3 Computer software requirements.
|
|
144
|
-
|
|
145
|
-
This paragraph shall specify the requirements, if any, regarding computer software that must be used by, or incorporated into, the CSCI. Examples include operating systems, database management systems, communications/ network software, utility software, input and equipment simulators, test software, and manufacturing software. The correct nomenclature, version, and documentation references of each such software item shall be provided.
|
|
146
|
-
|
|
147
|
-
### 3.10.4 Computer communications requirements.
|
|
148
|
-
|
|
149
|
-
This paragraph shall specify the additional requirements, if any, concerning the computer communications that must be used by the CSCI. Examples include geographic locations to be linked; configuration and network topology; transmission techniques; data transfer rates; gateways; required system use times; type and volume of data to be transmitted/received; time boundaries for transmission/ reception/response; peak volumes of data; and diagnostic features.
|
|
150
|
-
|
|
151
|
-
## 3.11 Software quality factors.
|
|
152
|
-
|
|
153
|
-
This paragraph shall specify the CSCI requirements, if any, concerned with software quality factors identified in the contract or derived from a higher level specification. Examples include quantitative requirements regarding CSCI functionality (the ability to perform all required functions), reliability (the ability to perform with correct, consistent results), maintainability (the ability to be easily corrected), availability (the ability to be accessed and operated when needed), flexibility (the ability to be easily adapted to changing requirements), portability (the ability to be easily modified for a new environment), reusability (the ability to be used in multiple applications), testability (the ability to be easily and thoroughly tested), usability (the ability to be easily learned and used), and other attributes.
|
|
154
|
-
|
|
155
|
-
## 3.12 Design and implementation constraints.
|
|
156
|
-
|
|
157
|
-
This paragraph shall specify the requirements, if any, that constrain the design and implementation of the CSCI. These requirements may be specified by reference to appropriate commercial or military standards and specifications. Examples include requirements concerning:
|
|
158
|
-
|
|
159
|
-
a. Use of a particular CSCI architecture or requirements on the architecture, such as required databases or other software units; use of standard, military, or existing components; or use of Government/acquirer-furnished property (equipment, information, or software)
|
|
160
|
-
|
|
161
|
-
b. Use of particular design or implementation standards; use of particular data standards; use of a particular programming language
|
|
162
|
-
|
|
163
|
-
c. Flexibility and expandability that must be provided to support anticipated areas of growth or changes in technology, threat, or mission
|
|
164
|
-
|
|
165
|
-
## 3.13 Personnel-related requirements.
|
|
166
|
-
|
|
167
|
-
This paragraph shall specify the CSCI requirements, if any, included to accommodate the number, skill levels, duty cycles, training needs, or other information about the personnel who will use or support the CSCI. Examples include requirements for number of simultaneous users and for built-in help or training features. Also included shall be the human factors engineering requirements, if any, imposed on the CSCI. These requirements shall include, as applicable, considerations for the capabilities and limitations of humans; foreseeable human errors under both normal and extreme conditions; and specific areas where the effects of human error would be particularly serious. Examples include requirements for color and duration of error messages, physical placement of critical indicators or keys, and use of auditory signals.
|
|
168
|
-
|
|
169
|
-
## 3.14 Training-related requirements.
|
|
170
|
-
|
|
171
|
-
This paragraph shall specify the CSCI requirements, if any, pertaining to training. Examples include training software to be included in the CSCI.
|
|
172
|
-
|
|
173
|
-
## 3.15 Logistics-related requirements.
|
|
174
|
-
|
|
175
|
-
This paragraph shall specify the CSCI requirements, if any, concerned with logistics considerations. These considerations may include: system maintenance, software support, system transportation modes, supply-system requirements, impact on existing facilities, and impact on existing equipment.
|
|
176
|
-
|
|
177
|
-
## 3.16 Other requirements.
|
|
178
|
-
|
|
179
|
-
This paragraph shall specify additional CSCI requirements, if any, not covered in the previous paragraphs.
|
|
180
|
-
|
|
181
|
-
## 3.17 Packaging requirements.
|
|
182
|
-
|
|
183
|
-
This section shall specify the requirements, if any, for packaging, labeling, and handling the CSCI for delivery (for example, delivery on 8 track magnetic tape labelled and packaged in a certain way). Applicable military specifications and standards may be referenced if appropriate.
|
|
184
|
-
|
|
185
|
-
## 3.18 Precedence and criticality of requirements.
|
|
186
|
-
|
|
187
|
-
This paragraph shall specify, if applicable, the order of precedence, criticality, or assigned weights indicating the relative importance of the requirements in this specification. Examples include identifying those requirements deemed critical to safety, to security, or to privacy for purposes of singling them out for special treatment. If all requirements have equal weight, this paragraph shall so state.
|
|
188
|
-
|
|
189
|
-
# 4. Qualification provisions.
|
|
190
|
-
|
|
191
|
-
This section shall define a set of qualification methods and shall specify for each requirement in Section 3 the method(s) to be used to ensure that the requirement has been met. A table may be used to present this information, or each requirement in Section 3 may be annotated with the method(s) to be used. Qualification methods may include:
|
|
192
|
-
|
|
193
|
-
a. Demonstration: The operation of the CSCI, or a part of the CSCI, that relies on observable functional operation not requiring the use of instrumentation, special test equipment, or subsequent analysis.
|
|
194
|
-
|
|
195
|
-
b. Test: The operation of the CSCI, or a part of the CSCI, using instrumentation or other special test equipment to collect data for later analysis.
|
|
196
|
-
|
|
197
|
-
c. Analysis: The processing of accumulated data obtained from other qualification methods. Examples are reduction, interpretation, or extrapolation of test results.
|
|
198
|
-
|
|
199
|
-
d. Inspection: The visual examination of CSCI code, documentation, etc.
|
|
200
|
-
|
|
201
|
-
e. Special qualification methods: Any special qualification methods for the CSCI, such as special tools, techniques, procedures, facilities, and acceptance limits.
|
|
202
|
-
|
|
203
|
-
# 5. Requirements traceability.
|
|
204
|
-
|
|
205
|
-
This paragraph shall contain:
|
|
206
|
-
|
|
207
|
-
a. Traceability from each CSCI requirement in this specification to the system (or subsystem, if applicable) requirements it addresses. (Alternatively, this traceability may be provided by annotating each requirement in Section 3.)
|
|
208
|
-
|
|
209
|
-
Note: Each level of system refinement may result in requirements not directly traceable to higher-level requirements. For example, a system architectural design that creates multiple CSCIs may result in requirements about how the CSCIs will interface, even though these interfaces are not covered in system requirements. Such requirements may be traced to a general requirement such as "system implementation" or to the system design decisions that resulted in their generation.
|
|
210
|
-
|
|
211
|
-
b. Traceability from each system (or subsystem, if applicable) requirement allocated to this CSCI to the CSCI requirements that address it. All system (subsystem) requirements allocated to this CSCI shall be accounted for. Those that trace to CSCI requirements contained in Interface Requirements Specifications (IRSs) shall reference those IRSs.
|
|
212
|
-
|
|
213
|
-
# 6. Notes.
|
|
214
|
-
|
|
215
|
-
This section shall contain any general information that aids in understanding this specification (e.g., background information, glossary, rationale). This section shall include an alphabetical listing of all acronyms, abbreviations, and their meanings as used in this document and a list of any terms and definitions needed to understand this document.
|
|
216
|
-
|
|
217
|
-
# A. Appendixes.
|
|
218
|
-
|
|
219
|
-
Appendixes may be used to provide information published separately for convenience in document maintenance (e.g., charts, classified data). As applicable, each appendix shall be referenced in the main body of the document where the data would normally have been provided. Appendixes may be bound as separate documents for ease in handling. Appendixes shall be lettered alphabetically (A, B, etc.).
|
package/mil498/SSDD.md
DELETED
|
@@ -1,154 +0,0 @@
|
|
|
1
|
-
# 1. Scope.
|
|
2
|
-
|
|
3
|
-
This section shall be divided into the following paragraphs.
|
|
4
|
-
|
|
5
|
-
## 1.1 Identification.
|
|
6
|
-
|
|
7
|
-
This paragraph shall contain a full identification of the system to which this document applies, including, as applicable, identification number(s), title(s), abbreviation(s), version number(s), and release number(s).
|
|
8
|
-
|
|
9
|
-
## 1.2 System overview.
|
|
10
|
-
|
|
11
|
-
This paragraph shall briefly state the purpose of the system to which this document applies. It shall describe the general nature of the system; summarize the history of system development, operation, and maintenance; identify the project sponsor, acquirer, user, developer, and support agencies; identify current and planned operating sites; and list other relevant documents.
|
|
12
|
-
|
|
13
|
-
## 1.3 Document overview.
|
|
14
|
-
|
|
15
|
-
This paragraph shall summarize the purpose and contents of this document and shall describe any security or privacy considerations associated with its use.
|
|
16
|
-
|
|
17
|
-
# 2. Referenced documents.
|
|
18
|
-
|
|
19
|
-
This section shall list the number, title, revision, and date of all documents referenced in this document. This section shall also identify the source for all documents not available through normal Government stocking activities.
|
|
20
|
-
|
|
21
|
-
# 3. System-wide design decisions.
|
|
22
|
-
|
|
23
|
-
This section shall be divided into paragraphs as needed to present system-wide design decisions, that is, decisions about the system's behavioral design (how it will behave, from a user's point of view, in meeting its requirements, ignoring internal implementation) and other decisions affecting the selection and design of system components. If all such decisions are explicit in the requirements or are deferred to the design of the system components, this section shall so state. Design decisions that respond to requirements designated critical, such as those for safety, security, or privacy, shall be placed in separate subparagraphs. If a design decision depends upon system states or modes, this dependency shall be indicated. Design conventions needed to understand the design shall be presented or referenced. Examples of system-wide design decisions are the following:
|
|
24
|
-
|
|
25
|
-
a. Design decisions regarding inputs the system will accept and outputs it will produce, including interfaces with other systems, configuration items, and users (4.3.x of this DID identifies topics to be considered in this description). If part or all of this information is given in Interface Design Descriptions (IDDs), they may be referenced.
|
|
26
|
-
|
|
27
|
-
b. Design decisions on system behavior in response to each input or condition, including actions the system will perform, response times and other performance characteristics, description of physical systems modeled, selected equations/algorithms/ rules, and handling of unallowed inputs or conditions.
|
|
28
|
-
|
|
29
|
-
c. Design decisions on how system databases/data files will appear to the user (4.3.x of this DID identifies topics to be considered in this description). If part or all of this information is given in Database Design Descriptions (DBDDs), they may be referenced.
|
|
30
|
-
|
|
31
|
-
d. Selected approach to meeting safety, security, and privacy requirements.
|
|
32
|
-
|
|
33
|
-
e. Design and construction choices for hardware or hardware-software systems, such as physical size, color, shape, weight, materials, and markings.
|
|
34
|
-
|
|
35
|
-
f. Other system-wide design decisions made in response to requirements, such as selected approach to providing required flexibility, availability, and maintainability.
|
|
36
|
-
|
|
37
|
-
# 4. System architectural design.
|
|
38
|
-
|
|
39
|
-
This section shall be divided into the following paragraphs to describe the system architectural design. If part or all of the design depends upon system states or modes, this dependency shall be indicated. If design information falls into more than one paragraph, it may be presented once and referenced from the other paragraphs. Design conventions needed to understand the design shall be presented or referenced.
|
|
40
|
-
|
|
41
|
-
Note: For brevity, this section is written in terms of organizing a system directly into Hardware Configuration Items (HWCIs), Computer Software Configuration Items (CSCIs), and manual operations, but should be interpreted to cover organizing a system into subsystems, organizing a subsystem into HWCIs, CSCIs, and manual operations, or other variations as appropriate.
|
|
42
|
-
|
|
43
|
-
## 4.1 System components.
|
|
44
|
-
|
|
45
|
-
This paragraph shall:
|
|
46
|
-
|
|
47
|
-
a. Identify the components of the system (HWCIs, CSCIs, and manual operations). Each component shall be assigned a project-unique identifier. Note: a database may be treated as a CSCI or as part of a CSCI.
|
|
48
|
-
|
|
49
|
-
b. Show the static (such as "consists of") relationship(s) of the components. Multiple relationships may be presented, depending on the selected design methodology.
|
|
50
|
-
|
|
51
|
-
c. State the purpose of each component and identify the system requirements and system-wide design decisions allocated to it. (Alternatively, the allocation of requirements may be provided in 5.a.)
|
|
52
|
-
|
|
53
|
-
d. Identify each component's development status/type, if known (such as new development, existing component to be reused as is, existing design to be reused as is, existing design or component to be reengineered, component to be developed for reuse, component planned for Build N, etc.) For existing design or components, the description shall provide identifying information, such as name, version, documentation references, location, etc.
|
|
54
|
-
|
|
55
|
-
e. For each computer system or other aggregate of computer hardware resources identified for use in the system, describe its computer hardware resources (such as processors, memory, input/output devices, auxiliary storage, and communications/ network equipment). Each description shall, as applicable, identify the configuration items that will use the resource, describe the allocation of resource utilization to each CSCI that will use the resource (for example, 20% of the resource's capacity allocated to CSCI 1, 30% to CSCI 2), describe the conditions under which utilization will be measured, and describe the characteristics of the resource:
|
|
56
|
-
|
|
57
|
-
1. Descriptions of computer processors shall include, as applicable, manufacturer name and model number, processor speed/capacity, identification of instruction set architecture, applicable compiler(s), word size (number of bits in each computer word), character set standard (such as ASCII, EBCDIC), and interrupt capabilities.
|
|
58
|
-
2. Descriptions of memory shall include, as applicable, manufacturer name and model number and memory size, type, speed, and configuration (such as 256K cache memory, 16MB RAM (4MB x 4)).
|
|
59
|
-
3. Descriptions of input/output devices shall include, as applicable, manufacturer name and model number, type of device, and device speed/capacity.
|
|
60
|
-
4. Descriptions of auxiliary storage shall include, as applicable, manufacturer name and model number, type of storage, amount of installed storage, and storage speed.
|
|
61
|
-
5. Descriptions of communications/network equipment, such as modems, network interface cards, hubs, gateways, cabling, high speed data lines, or aggregates of these or other components, shall include, as applicable, manufacturer name and model number, data transfer rates/capacities, network topologies, transmission techniques, and protocols used.
|
|
62
|
-
6. Each description shall also include, as applicable, growth capabilities, diagnostic capabilities, and any additional hardware capabilities relevant to the description.
|
|
63
|
-
|
|
64
|
-
f. Present a specification tree for the system, that is, a diagram that identifies and shows the relationships among the planned specifications for the system components.
|
|
65
|
-
|
|
66
|
-
## 4.2 Concept of execution.
|
|
67
|
-
|
|
68
|
-
This paragraph shall describe the concept of execution among the system components. It shall include diagrams and descriptions showing the dynamic relationship of the components, that is, how they will interact during system operation, including, as applicable, flow of execution control, data flow, dynamically controlled sequencing, state transition diagrams, timing diagrams, priorities among components, handling of interrupts, timing/sequencing relationships, exception handling, concurrent execution, dynamic allocation/deallocation, dynamic creation/deletion of objects, processes, tasks, and other aspects of dynamic behavior.
|
|
69
|
-
|
|
70
|
-
## 4.3 Interface design.
|
|
71
|
-
|
|
72
|
-
This paragraph shall be divided into the following subparagraphs to describe the interface characteristics of the system components. It shall include both interfaces among the components and their interfaces with external entities such as other systems, configuration items, and users. Note: There is no requirement for these interfaces to be completely designed at this level; this paragraph is provided to allow the recording of interface design decisions made as part of system architectural design. If part or all of this information is contained in Interface Design Descriptions (IDDs) or elsewhere, these sources may be referenced.
|
|
73
|
-
|
|
74
|
-
### 4.3.1 Interface identification and diagrams.
|
|
75
|
-
|
|
76
|
-
This paragraph shall state the project-unique identifier assigned to each interface and shall identify the interfacing entities (systems, configuration items, users, etc.) by name, number, version, and documentation references, as applicable. The identification shall state which entities have fixed interface characteristics (and therefore impose interface requirements on interfacing entities) and which are being developed or modified (thus having interface requirements imposed on them). One or more interface diagrams shall be provided, as appropriate, to depict the interfaces.
|
|
77
|
-
|
|
78
|
-
### 4.3.x (Project-unique identifier of interface).
|
|
79
|
-
|
|
80
|
-
This paragraph (beginning with 4.3.2) shall identify an interface by project-unique identifier, shall briefly identify the interfacing entities, and shall be divided into subparagraphs as needed to describe the interface characteristics of one or both of the interfacing entities. If a given interfacing entity is not covered by this SSDD (for example, an external system) but its interface characteristics need to be mentioned to describe interfacing entities that are, these characteristics shall be stated as assumptions or as "When [the entity not covered] does this, [the entity that is covered] will ...." This paragraph may reference other documents (such as data dictionaries, standards for protocols, and standards for user interfaces) in place of stating the information here. The design description shall include the following, as applicable, presented in any order suited to the information to be provided, and shall note any differences in these characteristics from the point of view of the interfacing entities (such as different expectations about the size, frequency, or other characteristics of data elements):
|
|
81
|
-
|
|
82
|
-
a. Priority assigned to the interface by the interfacing entity(ies)
|
|
83
|
-
|
|
84
|
-
b. Type of interface (such as real-time data transfer, storage-and-retrieval of data, etc.) to be implemented
|
|
85
|
-
|
|
86
|
-
c. Characteristics of individual data elements that the interfacing entity(ies) will provide, store, send, access, receive, etc., such as:
|
|
87
|
-
|
|
88
|
-
1. Names/identifiers
|
|
89
|
-
a. Project-unique identifier
|
|
90
|
-
b. Non-technical (natural-language) name
|
|
91
|
-
c. DoD standard data element name
|
|
92
|
-
d. Technical name (e.g., variable or field name in code or database)
|
|
93
|
-
e. Abbreviation or synonymous names
|
|
94
|
-
2. Data type (alphanumeric, integer, etc.)
|
|
95
|
-
3. Size and format (such as length and punctuation of a character string)
|
|
96
|
-
4. Units of measurement (such as meters, dollars, nanoseconds)
|
|
97
|
-
5. Range or enumeration of possible values (such as 0-99)
|
|
98
|
-
6. Accuracy (how correct) and precision (number of significant digits)
|
|
99
|
-
7. Priority, timing, frequency, volume, sequencing, and other constraints, such as whether the data element may be updated and whether business rules apply
|
|
100
|
-
8. Security and privacy constraints
|
|
101
|
-
9. Sources (setting/sending entities) and recipients (using/receiving entities)
|
|
102
|
-
|
|
103
|
-
d. Characteristics of data element assemblies (records, messages, files, arrays, displays, reports, etc.) that the interfacing entity(ies) will provide, store, send, access, receive, etc., such as:
|
|
104
|
-
|
|
105
|
-
1. Names/identifiers
|
|
106
|
-
a. Project-unique identifier to be used for traceability
|
|
107
|
-
b. Non-technical (natural language) name
|
|
108
|
-
c. Technical name (e.g., record or data structure name in code or database)
|
|
109
|
-
d. Abbreviations or synonymous names
|
|
110
|
-
2. Data elements in the assembly and their structure (number, order, grouping)
|
|
111
|
-
3. Medium (such as disk) and structure of data elements/assemblies on the medium
|
|
112
|
-
4. Visual and auditory characteristics of displays and other outputs (such as colors, layouts, fonts, icons and other display elements, beeps, lights)
|
|
113
|
-
5. Relationships among assemblies, such as sorting/access characteristics
|
|
114
|
-
6. Priority, timing, frequency, volume, sequencing, and other constraints, such as whether the assembly may be updated and whether business rules apply
|
|
115
|
-
7. Security and privacy constraints
|
|
116
|
-
8. Sources (setting/sending entities) and recipients (using/receiving entities)
|
|
117
|
-
|
|
118
|
-
e. Characteristics of communication methods that the interfacing entity(ies) will use for the interface, such as:
|
|
119
|
-
|
|
120
|
-
1. Project-unique identifier(s)
|
|
121
|
-
2. Communication links/bands/frequencies/media and their characteristics
|
|
122
|
-
3. Message formatting
|
|
123
|
-
4. Flow control (such as sequence numbering and buffer allocation)
|
|
124
|
-
5. Data transfer rate, whether periodic/aperiodic, and interval between transfers
|
|
125
|
-
6. Routing, addressing, and naming conventions
|
|
126
|
-
7. Transmission services, including priority and grade
|
|
127
|
-
8. Safety/security/privacy considerations, such as encryption, user authentication, compartmentalization, and auditing
|
|
128
|
-
|
|
129
|
-
f. Characteristics of protocols that the interfacing entity(ies) will use for the interface, such as:
|
|
130
|
-
|
|
131
|
-
1. Project-unique identifier(s)
|
|
132
|
-
2. Priority/layer of the protocol
|
|
133
|
-
3. Packeting, including fragmentation and reassembly, routing, and addressing
|
|
134
|
-
4. Legality checks, error control, and recovery procedures
|
|
135
|
-
5. Synchronization, including connection establishment, maintenance, termination
|
|
136
|
-
6. Status, identification, and any other reporting features
|
|
137
|
-
|
|
138
|
-
g. Other characteristics, such as physical compatibility of the interfacing entity(ies) (dimensions, tolerances, loads, voltages, plug compatibility, etc.)
|
|
139
|
-
|
|
140
|
-
# 5. Requirements traceability.
|
|
141
|
-
|
|
142
|
-
This paragraph shall contain:
|
|
143
|
-
|
|
144
|
-
a. Traceability from each system component identified in this SSDD to the system requirements allocated to it. (Alternatively, this traceability may be provided in 4.1.)
|
|
145
|
-
|
|
146
|
-
b. Traceability from each system requirement to the system components to which it is allocated.
|
|
147
|
-
|
|
148
|
-
# 6. Notes.
|
|
149
|
-
|
|
150
|
-
This section shall contain any general information that aids in understanding this document (e.g., background information, glossary, rationale). This section shall contain an alphabetical listing of all acronyms, abbreviations, and their meanings as used in this document and a list of any terms and definitions needed to understand this document.
|
|
151
|
-
|
|
152
|
-
# A. Appendixes.
|
|
153
|
-
|
|
154
|
-
Appendixes may be used to provide information published separately for convenience in document maintenance (e.g., charts, classified data). As applicable, each appendix shall be referenced in the main body of the document where the data would normally have been provided. Appendixes may be bound as separate documents for ease in handling. Appendixes shall be lettered alphabetically (A, B, etc.).
|