List Steps in the SDLC
What happens in the Initiation and Plan phase of the SDLC
What happens in the Acquisition and Development and Plan phase of the SDLC
Analysis and Design and Thread Modeling
SLA/NDA
Programming and testing (code review, unit testing, static analysis)
Documentation
What happens in the Deployment phase of the SDLC
What happens in the Operations & Maintenance phase of the SDLC
Auditing/Continuous Monitoring
Change Control/Change Management
Data backups
What happens in the Decommissioning phase of the SDLC
Closing contracts
Data disposal
List SDLC Frameworks
Microsoft’s Security Development Lifecycle
Open Web Application Security Project (OWASP)
NIST 800-64 Special Security Considerations in the System Development Lifecycle
ISO 27034-1 Information technology - Security techniques - Application security ONF/ANF
Certification
AKA
Testing features and safeguards of a system to determine if it meets the organizations requirements
Applies to custom and COTS
AKA - Assessment
Accreditation
AKA
Management’s APPROVAL to DEPLOY the system into production, perhaps with special conditions (e.g managers authorization, seal of approval)
AKA Authorization
Certification and Accreditation AKA
Assessment and Authorization
Security System Development Lifecycle
The SSDLC builds security into each and every phase of the cycle
Even better and more proactive approach to building secure systems and applications
Organization Normative Framework (ONF)
ISO 27034
Used to help establish a framework with a security control library, required to build secure applications
Primary goal is to create seven containers that contain the policies and directions the organization uses during the development of operations of applications
Organization Normative Framework - ONF - Containers
Application Security Management Process (ASMP)
A component of ONF
Used to create, manage, maintain each Application Normative Framework (ANF)
ONF is used to produce an ANF with ASMP
Created in 5 steps:
Application Normative Framework (ANF)
ANF maintains the applicable portions of the ONF that are needed to enable a specific application to achieve the required level of security or the target level of trust
ONF to ANF is a one to many relationship
List common Software Development Methodologies
List Agile Principles
List Agile Values
Agile vs DevSecOps
Management goal for Agile are focused on completing development units called sprints
Agile divides development and operations teams and doesn’t emphasize automation, while DevSecOps combines development, operations and security and emphasizes automation
DevSecOps implements organizational change - business owners, developers, operators and security/quality assurance collaborate on the project;
DevSecOps implements cultural change - emphasizes training all team members to have wide variety of similar and equal skills
DevSecOps - overall project deadlines and major version release benchmarks have priority and automation is primary goal to maximize efficiency when deploying software
Agile Scrum Roles
Verification and Validation Model (V-Model)
A model like waterfall but test planning and testing start at the earlier stage
Verification - determining through testing that what was built matches what was designed
Validation - through business analysis, determining that the application fits the needs of the organization. Often called Acceptance testing.
Prototype Model
Before the start of the actual software development, a prototype is created
The prototype is demonstrated to the customer
The customer gives feedback until the prototype is accepted
Iterative/Non-Iterative
Waterfall is not iterative, each phase is discrete and finalized
Spiral, Agile, and SCRUM are all iterative (incremental) models with rounds of development
CI/CD/CD
method of frequently deliver apps to customers by using automation during the stages of application development