https://123dok.net/document/yd785r11-model-structuring-reusing-security-requirements-sources-security-requirements.html