The software security depends largely on how the system was designed, developed and deployed, so at this time it is necessary to take into account the security requirements already at the stage of requirements development and software design. There are some different approaches to security requirements engineering, each of them has its advantages and disadvantages. During the speech, methods of security requirements engineering, identifying parties, identifying and assessing the risks of software assets, tracking implementation of requirements, etc. will be considered.