security requirements

  1. Who consumes requirements?
  2. Getting security requirements implemented.
  3. Why do good requirements go bad?