69
SDLC: System Development Life Cycle cs5493

SDLC: System Development Life Cycle

  • Upload
    ciqala

  • View
    99

  • Download
    6

Embed Size (px)

DESCRIPTION

SDLC: System Development Life Cycle. cs5493. SDLC Classical Model. Linear Sequential Aka waterfall model. SDLC. Example: Concept to Planning. SDLC Model Variants. The classical SDLC model has been refined into more useful variants. SDLC Refined Model. SDLC Sustainment Cycle. - PowerPoint PPT Presentation

Citation preview

Page 1: SDLC: System Development Life Cycle

SDLC: System Development Life Cycle

cs5493

Page 2: SDLC: System Development Life Cycle

SDLC Classical Model

• Linear Sequential – Aka waterfall model

Page 3: SDLC: System Development Life Cycle

SDLC

Page 4: SDLC: System Development Life Cycle

Example: Concept to Planning

Page 5: SDLC: System Development Life Cycle

SDLC Model Variants

• The classical SDLC model has been refined into more useful variants.

Page 6: SDLC: System Development Life Cycle

SDLC Refined Model

Page 7: SDLC: System Development Life Cycle

SDLC Sustainment Cycle

• Changes are required to sustain the system– Planning needed changes based on technology,

market forces, security requirements, etc.– Analysis of proposed changes on the system– Design and integration of changes into the system– Implement proposed changes (make it so!)– Maintenance (things break, need replacement,

obsolescence)

Page 8: SDLC: System Development Life Cycle

SDLC : Sustainment Loop (cycle)

Page 9: SDLC: System Development Life Cycle

SDLC Refined Model

Page 10: SDLC: System Development Life Cycle

SDLC Applied to Information Systems

NIST (Uncle Sam) recommends including security in all development stages of an information system.

Page 11: SDLC: System Development Life Cycle

NIST Information SDLC Phases

• Initiation Phase

Page 12: SDLC: System Development Life Cycle

SDLC Phases

• Initiation Phase• Acquisition/Development Phase

Page 13: SDLC: System Development Life Cycle

SDLC Phases

• Initiation Phase• Acquisition/Development Phase• Implementation Phase

Page 14: SDLC: System Development Life Cycle

SDLC Phases

• Initiation Phase• Acquisition/Development Phase• Implementation Phase• Operations/Maintenance Phase

Page 15: SDLC: System Development Life Cycle

SDLC Phases

1.Initiation Phase2.Acquisition/Development Phase3.Implementation Phase4.Operations/Maintenance Phase5.Disposition Phase

Page 16: SDLC: System Development Life Cycle

Information SDLC (Executive Summary)

Page 17: SDLC: System Development Life Cycle

SDLC Phases

1.Initiation Phase2. Acquisition/Development Phase3. Implementation Phase4. Operations/Maintenance Phase5. Disposition Phase

Page 18: SDLC: System Development Life Cycle

1. Initiation Phase

a) Security Categorizationb) Preliminary Risk Assessment

Page 19: SDLC: System Development Life Cycle

1. Initiation Phase

a) Security Categorization

Security categorization standards assist in the appropriate selection of security controls.

Page 20: SDLC: System Development Life Cycle

1. Initiation Phase

a) Security Categorization

Categorization levels can be labeled low, moderate, or high.

...later to be categorized into a CC EAL.(Common Criteria Evaluation Assurance Level)

Page 21: SDLC: System Development Life Cycle

1. Initiation Phase

b) Preliminary Risk Assessment

Analysis that identifies the protection requirements for the system.*

*This would also be used in the certification/accreditation process.

Page 22: SDLC: System Development Life Cycle

SDLC Phases

1. Initiation Phase

2.Acquisition/Development Phase3. Implementation Phase4. Operations/Maintenance Phase5. Disposition Phase

Page 23: SDLC: System Development Life Cycle

2. Acquisition/Development Phase

• Risk Assessment (overlap with the previous phase)

Page 24: SDLC: System Development Life Cycle

2. Acquisition/Development Phase

• Risk Assessment• Security Functional Requirements

Page 25: SDLC: System Development Life Cycle

2. Acquisition/Development Phase

• Risk Assessment• Security Functional Requirements• Security Assurance Requirements Analysis

Page 26: SDLC: System Development Life Cycle

2. Acquisition/Development Phase

• Risk Assessment• Security Functional Requirements• Security Assurance Requirements Analysis• Cost Considerations & Reporting

Page 27: SDLC: System Development Life Cycle

2. Acquisition/Development Phase

• Risk Assessment• Security Functional Requirements• Security Assurance Requirements Analysis• Cost Considerations & Reporting• Security Planning

Page 28: SDLC: System Development Life Cycle

2. Acquisition/Development Phase

• Risk Assessment• Security Functional Requirements• Security Assurance Requirements Analysis• Cost Considerations & Reporting• Security Planning• Security Control Development

Page 29: SDLC: System Development Life Cycle

2. Acquisition/Development Phase

• Risk Assessment• Security Functional Requirements• Security Assurance Requirements Analysis• Cost Considerations & Reporting• Security Planning• Security Control Development• Developmental Security Test & Evaluation

Page 30: SDLC: System Development Life Cycle

2. Acquisition/Development Phase

a) Risk Assessmentb) Security Functional Requirementsc) Security Assurance Requirements Analysisd) Cost Considerations & Reportinge) Security Planningf) Security Control Developmentg) Developmental Security Test & Evaluationh) Other Components

Page 31: SDLC: System Development Life Cycle

2. a) Risk Assessment

• Overlaps with the previous phase: – identify the protection requirements for the

system .

Page 32: SDLC: System Development Life Cycle

2. b) Security Functional Requirements Analysis

• Should include consideration of relevant laws and regulations.

• This applies to • Government agencies• Companies with government contracts• Payment card industry laws and regulations• etc

Page 33: SDLC: System Development Life Cycle

2. c) Security Assurance Requirements Analysis

• The correct and effective use of security controls.– CC can be helpful here. Choose systems that have

been evaluated to meet an assurance standard.

Page 34: SDLC: System Development Life Cycle

2. d) Cost Considerations and Reporting

• Estimate the cost of information security over the life-cycle of the system.

Page 35: SDLC: System Development Life Cycle

2. e) Security Planning

• The agreed security controls, planned or in place, are fully documented.

Page 36: SDLC: System Development Life Cycle

2. f) Security Control Development

1. New systems : the security plan includes provisions for development of security controls. (Sustainability cycle)

2. Existing systems : implies the advancement of the security controls, especially those that are ineffective. (Sustainability cycle)

Page 37: SDLC: System Development Life Cycle

2. g) Developmental Security Testing and Evaluation

• An assurance that the security controls for a new system are: – Implemented correctly– Operate as intended– Produce the desired outcome

(as in certification and accreditation…)

Page 38: SDLC: System Development Life Cycle

2. h) Other Planning Components

• Examples:– Participation of all the relevant groups &

individuals in the security planning process.*• *This would include among others, such individuals as

the Certification Agent and Information System Owner.

Page 39: SDLC: System Development Life Cycle

SDLC Phases

1. Initiation Phase2. Acquisition/Development Phase

3.Implementation Phase4. Operations/Maintenance Phase5. Disposition Phase

Page 40: SDLC: System Development Life Cycle

3. Implementation Phase

• Inspection & Acceptance

Page 41: SDLC: System Development Life Cycle

3. Implementation Phase

• Inspection & Acceptance• Security Control Integration

Page 42: SDLC: System Development Life Cycle

3. Implementation Phase

• Inspection & Acceptance• Security Control Integration• Security Certification

Page 43: SDLC: System Development Life Cycle

3. Implementation Phase

a)Inspection & Acceptanceb)Security Control Integrationc) Security Certificationd)Security Accreditation

Page 44: SDLC: System Development Life Cycle

3. a) Inspection & Acceptance

• Validate that the documented functionality is actually implemented.

Page 45: SDLC: System Development Life Cycle

3. b) Security Control Integration

• The security controls are integrated at the operational site where the information system is deployed for operation.

Page 46: SDLC: System Development Life Cycle

3. c) Security Certification

• Certification occurs when security controls are– Implemented correctly,– Operate as intended; and,– Produce the desired outcome.

(As determined by the Certification Agent)

Page 47: SDLC: System Development Life Cycle

3. d) Security Accreditation

• The Authorizing Official (AO) will determine if the risks are acceptable for the information system.

Page 48: SDLC: System Development Life Cycle

SDLC Phases

1. Initiation Phase2. Acquisition/Development Phase3. Implementation Phase

4.Operations/Maintenance Phase5. Disposition Phase

Page 49: SDLC: System Development Life Cycle

4. Operations Maintenance Phase

• Configuration Management Control

Page 50: SDLC: System Development Life Cycle

4. Operations Maintenance Phase

a)Configuration Management & Controlb)Continuous Monitoring

Page 51: SDLC: System Development Life Cycle

4. a) Configuration Management & Control

• Consideration of how changes to the system will impact the overall security.– Changes could be updates and patches to the OS

and other software systems– Changes could be replacing failed or obsolete

hardware.

Page 52: SDLC: System Development Life Cycle

4. b) Continuous Monitoring

• Security controls are monitored through periodic testing and evaluation to ensure they work as intended.

Page 53: SDLC: System Development Life Cycle

SDLC Phases

1. Initiation Phase2. Acquisition/Development Phase3. Implementation Phase4. Operations/Maintenance Phase

5.Disposition Phase

Page 54: SDLC: System Development Life Cycle

5. Disposition Phase

• Information Preservation

Page 55: SDLC: System Development Life Cycle

5. Disposition Phase

• Information Preservation• Media Sanitization

Page 56: SDLC: System Development Life Cycle

5. Disposition Phase

a) Information Preservationb) Media Sanitizationc) Hardware & Software Disposal

Page 57: SDLC: System Development Life Cycle

5. a) Information Preservation

• Ensures information is retained as necessary and accommodates technology changes that may render current retrieval methods as obsolete.

Page 58: SDLC: System Development Life Cycle

5. b) Media Sanitization

• Data destined for disposal is properly erased.

Page 59: SDLC: System Development Life Cycle

5. c) Hardware & Software Disposal

• Hardware and software is disposed of in accordance with regulations, license agreements, laws, and agency policies.

Page 60: SDLC: System Development Life Cycle

FIN

Page 61: SDLC: System Development Life Cycle

Development/Acquisition Phase

• Security requirements shall be developed at the same time system planners define the requirements of the system.

Page 62: SDLC: System Development Life Cycle

Development/Acquisition Phase

• Security requirements shall be developed at the same time system planners define the requirements of the system.

• The security requirements shall be incorporated into design specifications along with assurances that the security features acquired can and do work correctly and effectively

Page 63: SDLC: System Development Life Cycle

Implementation Phase

• The system's security features shall be configured and enabled

Page 64: SDLC: System Development Life Cycle

Implementation Phase

• The system's security features shall be configured and enabled

• The system shall be tested and installed or fielded and the system authorized for processing.

Page 65: SDLC: System Development Life Cycle

Operation/Maintenance Phase

• Complete the many security activities outlined in the various rules of the system.

Page 66: SDLC: System Development Life Cycle

Operation/Maintenance Phase

• Complete the many security activities outlined in the various rules of the system.

• Perform backups, hold training classes, password management, review the system are just some examples

Page 67: SDLC: System Development Life Cycle

Disposal Phase

• Information may be moved to another system, archived, discarded or destroyed.

Page 68: SDLC: System Development Life Cycle

Disposal Phase

• Information may be moved to another system, archived, discarded or destroyed.

• Hardware and software can be sold, given away or discarded. – There is rarely a need to destroy hardware accept

for some storage media containing confidential information that cannot be sanitized without destruction

Page 69: SDLC: System Development Life Cycle

Disposal Phase

• Information may be moved to another system, archived, discarded or destroyed.

• Hardware and software can be sold, given away or discarded.

• The disposition of software needs to be in keeping with its license or other agreements