Professional Documents
Culture Documents
and
Management
Security in the SDLC
Balancing Information Security and Access
Approaches to Information Security
Implementation
Bottom-up approach
A method of establishing security policies and/or practices
that begins as a grassroots effort in which systems
administrators attempt to improve the security of their
systems.
Top-down approach
A methodology of establishing security policies and/or
practices that is initiated by upper management.
Approaches to Information Security
Implementation
Waterfall model
A type of SDLC in which each phase of the process “flows
from” the information gained in the previous phase, with
multiple opportunities to return to previous phases and
make adjustments
The Systems Development Life Cycle
The Systems Development Life Cycle
Initiation
• Initial delineation of business requirements in terms of confidentiality, integrity, and
availability
• Determination of information categorization and identification of known special handling
requirements to transmit, store, or create information such as personally identifiable
information
• Determination of any privacy requirements.
The NIST Approach to Securing SDLC
Development/Acquisition
• Conduct the risk assessment and use the results to supplement the baseline
security controls
• Analyze security requirements
• Perform functional and security testing
• Prepare initial documents for system certification and accreditation
• Design security architecture.
The NIST Approach to Securing SDLC
Implementation/Assessment
• Integrate the information system into its environment
• Plan and conduct system certification activities in synchronization with
testing of security controls
• Complete system accreditation activities.
Disposal
• Building and executing a disposal/transition plan
• Archival of critical information
• Sanitization of media
• Disposal of hardware and software.
Microsoft’s SDL
Security Professionals and
the Organization
Senior Management
• Chief information officer (CIO)
An executive-level position that oversees the organization’s computing
technology and strives to create efficiency in the processing and access of
the organization’s information.
Members’ roles:
• Risk assessment specialists: People who understand financial risk
assessment techniques, the value of organizational assets, and the
security methods to be used.
• Security professionals: Dedicated, trained, and well-educated
specialists in all aspects of information security from both a technical and
nontechnical standpoint.
• Systems administrators: People with the primary responsibility for
administering systems that house the information used by the
organization.
• End users: Those whom the new system will most directly affect.
Ideally, a selection of users from various departments, levels, and
degrees of technical knowledge assist the team in focusing on the
application of realistic controls that do not disrupt the essential business
activities they seek to safeguard.
Data Responsibilities
• Data custodians
Individuals who work directly with data owners and are responsible for
storage, maintenance, and protection of information.
• Data owners
Individuals who control and are responsible for the security and use of a
particular set of information
Data users
Internal and external stakeholders (customers, suppliers, and employees)
who interact with information in support of their organization’s planning
and operations.