Vous êtes sur la page 1sur 10

Khandker M Qaiduzzaman

Presented Lecturer, Department of Swe


By Daffodil International University

Cell no.: +8801685679768


Email: khandker.swe@diu.edu.bd
• Systems Development Life Cycle (SDLC):
methodology for design and implementation of
information system within an organization.

THE SYSTEMS
• Methodology: formal approach to problem solving
DEVELOPMENT based on structured sequence of procedures
LIFE CYCLE
• Using a methodology:
• Ensures a rigorous process
• Increases probability of success

• Traditional SDLC consists of six general phases


• The same phases used in traditional SDLC may be
adapted to support specialized implementation
THE SECURITY of an IS project

SYSTEMS
DEVELOPMENT • Identification of specific threats and creating
controls to counter them
LIFE CYCLE
• SecSDLC is a coherent program rather than a
series of random, seemingly unconnected actions
BASIC IDEA OF SECSDLC
• Investigation – The investigation phase of the SecSDLC begins with a directive
from upper management specifying the process, outcomes, and goals of the
project, as well as its budget and other constraints.

• Analysis – A preliminary analysis of existing security policies or programs,


along with documented current threats and associated controls are
conducted.

• Logical Design – In the logical design phase, team members create and
develop the blueprint for security, and examine as well as implement key
policies that influence later decisions.
BASIC IDEA OF SECSDLC
• Physical Design – In the physical design phase, team members evaluate the
technology needed to support the security blueprint, generate alternative
solutions, and agree upon a final design.

• Implementation – The security solutions are acquired, tested, implemented,


and tested again. Personnel issues are evaluated and specific training and
education programs conducted

• Maintenance – Once the information security program has been


implemented, it must be operated, properly managed, and kept up to date
by means of established procedures. (Charles 2013)
SDLC SECSDLC
Investigation Investigation & Analysis
• What problem to be solved? • Document project process & goal in Security Policy as defined
• Objective, Constraints and Scope of project by the management
• Primarily Cost Benefit Analysis - evaluates
prescribed benefits vs. appropriate level of • Security Categorization
cost o Define 3 levels (low, moderate & high) of potential impact
• Feasibility Analysis – Assess economical, on organization/ individual in case of security breach.
technical, behavioral feasibility of process. o It is useful for organization in making the appropriate
(try to measure whether implementation is selection of security controls.
worthy in the context of time and effort)
Analysis • Primary Risk Assessment
• Primarily assessment of the organization o Identify basic Security Need of the System.
• Understand Current System o Defines the threat environment where the system
• Capability to support Proposed System operates.
• What new system is expected to do?
• How the new solution interact with existing
system?
Logical Design Logical & Physical Design

• Create System Solution as per Business • Risk Assessment – Identify the protection requirement through a
formal risk assessment process.
Requirement.
• Applications are selected to provide
• Security Functional Requirement Analysis
• Service o System security environment
o Security functional requirement
• Data Support
• Needed input • Security Assurance Requirement – Development activity require
• No references for specific technology, vendor and assure that the information security will work correctly and
effectively by produce evidence.
& product.
• Alternative solution proposed with it • Cost consideration and reporting – How much cost can be
• Strengths & Weaknesses attributed to information security
• Cost & Benefits
• Security Plan – Ensure that agreed upon security controls are
• Another Feasibility performed properly planned or in place and fully documented.
Physical Design
• Select specific technology for implementation • Security Control Development – Ensure security controls are
• Decide make or buy designed, developed and implemented as per security plan.
• Perform another feasibility analysis
• Present the design to the higher • Developmental security test and evaluation.
management for approval
Implementation Implementation

• Inspection & Acceptance – Organization validates and verifies


• Software developed/ ordered & received the functionality described in specification.
• Tested in test environment
• Conduct user training • System integration
o Ensure system is integrated in operational site
• Create supporting documents
o Vendor guideline followed for
• Implement in live environment  Setting Security Controls
• Conduct feasibility analysis on  Enabling Switches
o Performance review
• Security Certificate
o Acceptance test
o Ensure controls are effectively implemented through
established verification technique.
o Describe remaining vulnerabilities.

• Security Accreditation – Provide necessary security


authorization (from Senior Management) of an Information
System to process, store or transmit that is required.
Maintenance & Change Maintenance & Change

• Configuration Management & Control – Consideration of potential


• Consists of the following tasks security impact due to specific changes in Information system.
o Support the system
• Continuous Monitoring
o Modify the system as required until the o Conduct security control monitoring
useful life of the system. o Prepare security status
o Upgrade, update, patch management. o Submit the status to the appropriate personnel for necessary
action
o Test the system periodically for compliance.
o Feasibility of continuance vs. discontinuance • Information Preservation
is evaluated. o Ensure retention of Information as necessary to confirm legal
requirement
o Accommodate future technology for information retrieval.

• Media Sanitization – Ensures that data is deleted erased, and written


over as necessary

• Hardware and software disposal – Ensure HW & SW is disposed of as


directed by the Information System Security Officer.
THANK YOU

Vous aimerez peut-être aussi