Sensitivity-Driven Approach
Validates priority and scope of security based on asset evaluation
Provides comprehensive view of asset management
Ensures coverage of requirements types for each info-asset
Structure can mask efficient application of security services
Analysis is exhaustive and time-consuming
Spec may be difficult to use and maintain due to redundancies