INTRODUCTION
Great authorization and authentication will not save a system from a poorly planned implementation and sustainment. Shepherding a software-intensive system through project development to implementation is just the beginning of the saga. Modern software-intensive systems face the confusing and multifaceted challenge of sustainment. After implementation is when the security problems will show up.