I. Introduction
“Just about every software system deployed today must defend itself from malicious adversaries” [1]. Building defenses, however, requires a clear overview of security risks which change across the development life cycle for many reasons, e.g., new threats arise, new vulnerabilities are reported, risks are introduced at different phases of development. Therefore, assuming that security requirements should be neatly engineered up-front and frozen for the rest of the development life cycle (independent of the development paradigm adopted) is rather unrealistic. In practice, new security requirements are discovered along the development life cycle, some of them will have to be addressed by the system and some will be accepted as residual risks. Security risk management has the potential to help in making such decisions in an informed way, providing a clearer overview of the state of system security, when deployed.