CSSLP Domain 6 – Secure Software Lifecycle Management Flashcards

(101 cards)

1
Q
  1. What is the goal of secure software lifecycle management?
A

To integrate security activities and controls throughout the software development lifecycle (SDLC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What is the key difference between SDLC and SSDLC?
A

SSDLC explicitly embeds security considerations and checkpoints into every SDLC phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What is the purpose of configuration and version control in secure lifecycle management?
A

To ensure integrity, traceability, and control of all changes to software and documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What are the main SDLC phases?
A

Requirements, Design, Implementation, Testing, Deployment, and Maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What are the main benefits of an SSDLC?
A

Reduced vulnerabilities, improved compliance, lower remediation costs, and increased customer confidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What is the purpose of a security roadmap?
A

To define long-term goals, milestones, and metrics for improving software security maturity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What is continuous improvement in the context of SSDLC?
A

Regularly evaluating and enhancing security processes based on feedback, incidents, and assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What is the role of metrics in secure lifecycle management?
A

To measure the effectiveness of security processes and support data-driven improvements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Give examples of security metrics in software projects.
A

Number of vulnerabilities found per release, mean time to remediate (MTTR), and percentage of code reviewed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What is Integrated Risk Management (IRM)?
A

A coordinated approach combining governance, risk, and compliance (GRC) for consistent risk treatment across the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What is the purpose of security documentation in SSDLC?
A

To provide traceabilityt, accountability, and evidence of compliance and due diligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What are examples of key SSDLC documents?
A

Security policies, threat models, risk registers, test plans, and verification reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is the difference between preventive and detective lifecycle controls?
A

Preventive controls stop incidents before they occur; detective controls identify them after occurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What are common secure SDLC frameworks?
A

Microsoft SDL, NIST SP 800-218 (SSDF), OWASP SAMM, and BSIMM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. What are the four practices of NIST’s SSDF?
A

Prepare the organization, Protect the software, Produce well-secured software, and Respond to vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What is the purpose of baseline management?
A

To define and control approved versions of software and configurations against which changes are measured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. What is the relationship between change management and security?
A

All changes must be authorized, documented, and reviewed to prevent unauthorized or insecure modifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Why is decommissioning software important in lifecycle management?
A

To ensure secure data disposal, license management, and removal of unsupported systems that may pose risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. What are best practices for software retirement?
A

Follow end-of-life policies, archive essential data, securely destroy sensitive information, and revoke access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. What is security governance in the SDLC context?
A

Oversight ensuring that security aligns with business goals, policies, and regulatory obligations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. What are common challenges to implementing an SSDLC?
A

Lack of executive support, resource constraints, inconsistent processes, and developer resistance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. What is the role of training in secure lifecycle management?
A

To improve staff awareness and competence in applying security principles throughout development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. How does Agile development handle security differently from Waterfall?
A

Security is integrated iteratively into sprints rather than being treated as a final phase task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. What is the goal of release management in SSDLC?
A

To ensure that only verified and approved software versions are deployed to production environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
25. What is meant by a 'security culture' in software development?
A mindset where every stakeholder prioritizes security as part of their daily work and decision-making.
26
1. What is the main purpose of aligning SSDLC with business objectives?
To ensure that security investments support organizational goals and risk appetite while maintaining value delivery.
27
2. What role does senior management play in lifecycle security?
They provide oversight, resources, and governance to ensure that security is integrated into business processes.
28
3. Why is early stakeholder engagement critical in SSDLC?
It ensures that security, privacy, and compliance requirements are identified and incorporated from the start.
29
4. What is a security baseline?
A predefined set of security configurations and controls that define the minimum acceptable security posture.
30
5. How does version control support security assurance?
It provides traceability of changes, supports rollback, and ensures integrity of code and documentation.
31
6. What is the purpose of configuration audits?
To verify that software components match approved baselines and comply with security standards.
32
7. How does risk acceptance fit into SSDLC?
It documents known risks that are consciously accepted after considering mitigation options and residual impact.
33
8. What is the purpose of integrating SSDLC into DevSecOps?
To automate and embed security controls throughout the CI/CD pipeline, enabling continuous secure delivery.
34
9. What is a key characteristic of a mature SSDLC?
Defined, repeatable processes with measurable outcomes and continuous feedback loops for improvement.
35
10. How does threat modeling contribute to secure lifecycle management?
It identifies risks early, informs security requirements, and validates that mitigations remain effective.
36
11. What are examples of process-level controls in SSDLC?
Code review policies, vulnerability scanning, and formal change management processes.
37
12. What are examples of technical controls in SSDLC?
Encryption, authentication mechanisms, and automated testing scripts integrated into CI/CD pipelines.
38
13. What is the relationship between SDLC gates and security reviews?
Each gate includes a checkpoint to verify that defined security requirements and deliverables are met.
39
14. Why is documentation critical for security audits?
It provides evidence that processes were followed and controls were applied effectively.
40
15. What is a risk register and why is it used?
A centralized log for tracking identified risks, likelihood, impact, ownership, and mitigation progress.
41
16. What does 'shift-left' mean in security testing?
Integrating security and testing earlier in the development process to catch issues before deployment.
42
17. What is the purpose of a post-implementation review?
To evaluate whether deployed software meets its security, performance, and compliance objectives.
43
18. How can continuous monitoring improve SSDLC maturity?
It provides real-time feedback on security posture and enables quick detection and remediation of issues.
44
19. What is the value of lessons-learned sessions in SSDLC?
They help refine processes by capturing insights from incidents, audits, and testing outcomes.
45
20. What is the difference between preventive and corrective controls?
Preventive controls stop issues from occurring; corrective controls restore normal operations after an incident.
46
21. What is the benefit of integrating SSDLC with enterprise GRC systems?
It enables centralized management of compliance, risk, and control effectiveness across projects.
47
22. What does maturity level 5 (Optimizing) in CMMI or SSE-CMM indicate?
Processes are continuously improved based on quantitative feedback and innovation.
48
23. What is a security champion program?
A program that embeds trained developers or architects as security advocates within development teams.
49
24. Why is alignment with ISO 27034 important in SSDLC?
It provides a structured framework for integrating application security throughout the lifecycle.
50
25. What are the main inputs to a security roadmap?
Risk assessments, audit findings, incident reports, business priorities, and regulatory requirements.
51
Question
Model Answer
52
Explain the goal of secure software lifecycle management. (Domain 6)
To ensure that security is systematically integrated and maintained throughout all phases of the software development lifecycle.
53
Describe the purpose of integrating security governance with the SDLC. (Domain 6)
Integration ensures policies, standards, and accountability are applied consistently across development and maintenance activities.
54
Define secure lifecycle management. (Domain 6)
A structured approach to planning, developing, deploying, operating, and retiring software securely and efficiently.
55
Explain the relationship between lifecycle management and software assurance. (Domain 6)
Effective lifecycle management provides the evidence and processes needed to demonstrate that software is trustworthy and resilient.
56
Describe the importance of lifecycle documentation. (Domain 6)
Documentation captures decisions, processes, and baselines, ensuring transparency, auditability, and repeatability.
57
Explain how lifecycle governance supports software security. (Domain 6)
Governance provides oversight and accountability mechanisms to ensure compliance with policies and objectives.
58
Describe how lifecycle phase gates improve security assurance. (Domain 6)
Phase gates verify that key security tasks and deliverables are completed before moving to the next phase.
59
Define change control in the context of the SDLC. (Domain 6)
A formal process for requesting, evaluating, approving, and documenting modifications to software or environments.
60
Explain the importance of configuration management in lifecycle control. (Domain 6)
It ensures that software components remain consistent with approved baselines, reducing unauthorized or unsafe changes.
61
Describe how version control supports lifecycle management. (Domain 6)
It provides traceability for changes, enabling rollback, auditing, and controlled evolution of code and documentation.
62
Explain how risk management integrates into lifecycle management. (Domain 6)
Risk management identifies, evaluates, and mitigates risks at each phase to maintain acceptable residual risk levels.
63
Describe how quality assurance complements secure lifecycle management. (Domain 6)
QA ensures processes are followed correctly and that outcomes meet defined standards, supporting software assurance goals.
64
Define the purpose of lifecycle metrics. (Domain 6)
Metrics measure the effectiveness of security processes and controls over time to guide continuous improvement.
65
Explain the role of key performance indicators (KPIs) in lifecycle management. (Domain 6)
KPIs track measurable objectives—such as vulnerability closure time—to assess program success.
66
Describe how continuous improvement is achieved in lifecycle management. (Domain 6)
Feedback from incidents, metrics, and reviews drives iterative enhancements to security processes and controls.
67
Explain the role of the security champion in the lifecycle. (Domain 6)
Security champions promote security awareness, guide developers, and act as the liaison between security and delivery teams.
68
Describe the responsibility of a release manager in secure lifecycle management. (Domain 6)
The release manager ensures all controls are met, artifacts approved, and documentation updated before deployment.
69
Define RACI and its purpose in lifecycle management. (Domain 6)
RACI (Responsible, Accountable, Consulted, Informed) clarifies ownership and communication for security activities.
70
Explain how cross-functional collaboration enhances secure lifecycle management. (Domain 6)
Collaboration between development, operations, and security reduces silos and accelerates secure decision-making.
71
Describe the role of executive leadership in lifecycle governance. (Domain 6)
Executives set tone, allocate resources, and ensure that security objectives align with business priorities.
72
Explain how security requirements evolve during the SDLC. (Domain 6)
Requirements must adapt to design changes, new threats, and operational feedback while preserving traceability.
73
Describe security considerations during software maintenance. (Domain 6)
Maintenance includes patching, vulnerability management, and regression testing to maintain security posture.
74
Define baseline management and its role in lifecycle management. (Domain 6)
Baseline management establishes and protects approved versions of artifacts, allowing for controlled evolution of the system.
75
Explain why decommissioning is part of lifecycle management. (Domain 6)
Secure retirement ensures data destruction, access revocation, and documentation of lessons learned for future projects.
76
Describe the relationship between incident management and lifecycle management. (Domain 6)
Incidents inform lifecycle improvements by revealing process or control weaknesses.
77
Explain how release management contributes to secure lifecycle management. (Domain 6)
It coordinates testing, approval, and communication to ensure secure and predictable deployments.
78
Describe the importance of rollback procedures during release. (Domain 6)
Rollback plans ensure systems can revert to a safe state quickly after a failed or insecure release.
79
Define the concept of readiness review. (Domain 6)
A structured checkpoint confirming that controls, tests, and documentation are complete before release or transition.
80
Explain how automation supports release security. (Domain 6)
Automation enforces consistency, reduces manual errors, and provides verifiable audit trails for release activities.
81
Describe configuration drift and how it impacts lifecycle management. (Domain 6)
Drift introduces inconsistencies across environments, undermining testing reliability and compliance assurance.
82
Explain how third-party software affects lifecycle management. (Domain 6)
Third-party components require continuous evaluation, patching, and dependency monitoring throughout the lifecycle.
83
Describe how SLAs contribute to secure lifecycle management. (Domain 6)
SLAs define service expectations for security, availability, and response times to ensure accountability.
84
Define supplier risk monitoring in lifecycle management. (Domain 6)
Ongoing evaluation of vendor performance and compliance ensures security expectations are met.
85
Explain why external dependencies must be tracked throughout the lifecycle. (Domain 6)
Tracking dependencies prevents exposure from outdated or unmaintained components.
86
Describe the role of licensing in third-party lifecycle management. (Domain 6)
Licenses determine update rights and responsibilities that affect security and maintenance planning.
87
Explain how process maturity models support lifecycle improvement. (Domain 6)
Models like CMMI or SAMM guide incremental enhancement of security integration and process control.
88
Describe how to establish lifecycle baselines for measurement. (Domain 6)
Baselines provide reference points for tracking improvements and comparing process performance over time.
89
Define process metrics and their use. (Domain 6)
Metrics quantify aspects of performance such as defect rates or remediation speed to evaluate control effectiveness.
90
Explain how to balance cost, schedule, and security in lifecycle management. (Domain 6)
Risk-based prioritization aligns resources with the highest impact controls without derailing delivery timelines.
91
Describe how feedback loops enhance lifecycle quality. (Domain 6)
Regular retrospectives and reviews provide lessons that inform process refinements and policy updates.
92
Explain how compliance is verified in lifecycle management. (Domain 6)
Audits and reviews verify that lifecycle processes meet internal and external standards.
93
Describe the role of evidence collection in lifecycle compliance. (Domain 6)
Evidence such as logs, approvals, and reports demonstrates that security activities occurred as required.
94
Define audit readiness in software lifecycle management. (Domain 6)
Maintaining organized, current documentation ensures that teams can demonstrate compliance at any time.
95
Explain how deviation handling supports compliance. (Domain 6)
Documenting and remediating deviations ensures transparency and continuous improvement of processes.
96
Describe how compliance reporting contributes to lifecycle management. (Domain 6)
Reports provide visibility into adherence levels and highlight areas needing corrective action.
97
Explain the concept of continual service improvement in software lifecycle management. (Domain 6)
It applies lessons learned and metrics to incrementally strengthen lifecycle processes and security outcomes.
98
Describe how lessons learned after incidents improve lifecycle resilience. (Domain 6)
Documenting causes and responses prevents recurrence and strengthens processes for future projects.
99
Define the purpose of knowledge management in lifecycle management. (Domain 6)
Capturing and sharing institutional knowledge ensures consistency and avoids repeating past mistakes.
100
Explain why communication is key to lifecycle success. (Domain 6)
Effective communication ensures alignment across teams, maintains accountability, and reduces misunderstanding.
101
Describe the relationship between continuous monitoring and lifecycle management. (Domain 6)
Monitoring provides real-time visibility into system health and control effectiveness across the lifecycle.