Software Life Cycle
The table below summarizes the security considerations at each stage of the software life cycle:
Software life cycle stage |
Sub stage |
Security by design deliverables |
Concept Note |
Security risk assessment |
|
Feasibility study |
||
Project planning |
Security planning |
|
Acquisition |
Requirements & ToRs |
Security requirements |
RFP /inhouse |
||
Evaluation / inhouse |
Tender security evaluation |
|
Architecture & Design |
Architecture & Design |
Security design |
Development |
Development |
Secure development |
Testing |
Test planning |
Security test planning |
Component testing |
Application security testing |
|
System integration testing |
System security testing |
|
Deployment |
Deployment |
Secure configuration and access control Penetration testing |
Operations & maintenance |
Operations & support |
Audit & continuous monitoring |
Upgrade / Decommission |
Upgrade /Decommission |
Secure disposal |
Security by design ensures that security is not an afterthought but a fundamental aspect considered from the beginning. Below are security best practices that should be incorporated at each software lifecycle stage:
No Comments