0% found this document useful (0 votes)
29 views2 pages

SDLC3

The document outlines the system development life cycle (SDLC) and key security considerations for each phase: 1) Initiation phase establishes need and identifies security roles. Security requirements are assessed. 2) Development/Acquisition phase includes risk assessment, security testing, and developing security plans. 3) Implementation phase configures security, tests functionality, and obtains authorization to operate the system.

Uploaded by

Bharatesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views2 pages

SDLC3

The document outlines the system development life cycle (SDLC) and key security considerations for each phase: 1) Initiation phase establishes need and identifies security roles. Security requirements are assessed. 2) Development/Acquisition phase includes risk assessment, security testing, and developing security plans. 3) Implementation phase configures security, tests functionality, and obtains authorization to operate the system.

Uploaded by

Bharatesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

Initiation Phase.

During the initiation phase, the organization establishes the


need for a system and documents its purpose. Security planning should begin in the
initiation phase with the identification of key security roles to be carried out in
the development of the system. The information to be processed, transmitted, or
stored is evaluated for security requirements, and all stakeholders should have a
common understanding of the security considerations. The Information System
Security Officer (ISSO) should be identified as well. Security considerations are
key to the early integration of security, and to the assurance that threats,
requirements, and potential constraints in functionality and integration are
considered. Requirements for the confidentiality, integrity, and availability of
information should be assessed at this stage. Federal agencies should apply the
provisions of Federal Information Processing Standard (FIPS) 199, Standards for
Security Categorization of Federal Information and Information Systems, and FIPS
200, Minimum Security Requirements for Federal Information and Information Systems.
These standards require agencies to categorize their information systems as low-
impact, moderate-impact, or high-impact for the security objectives of
confidentiality, integrity, and availability and to select appropriate security
controls. Any information privacy requirements should be determined as well. Early
planning and awareness will result in savings in costs and staff time through
proper risk management planning. In this phase, the organization clearly defines
its project goals and high-level information security requirements, as well as the
enterprise security system architecture. Development/Acquisition Phase. During
this phase, the system is designed, purchased, programmed, developed, or otherwise
constructed. A key security activity in this phase is conducting a risk assessment
and using the results to supplement the baseline security controls. In addition,
the organization should analyze security requirements; perform functional and
security testing; prepare initial documents for system certification and
accreditation; and design the security architecture. The risk assessment enables
the organization to determine the risk to operations, assets, and individuals
resulting from the operation of information systems, and the processing, storage,
or transmission of information. After categorizing their systems in accordance with
FIPS 199 and 200, federal agencies should meet the minimum security requirements by
selecting the appropriate security controls and assurance requirements that are
described in NIST SP 800-53, Recommended Security Controls for Federal Information
Systems. Another essential element is the development of security plans, which
establish the security requirements for the information system, describe security
controls that have been selected, and present the rationale for security
categorization, how controls are implemented, and how use of systems can be
restricted in high-risk situations. Security plans document the decisions made in
the selection of controls, and are approved by authorized officials. The
developmental testing of the technical and security features and functions of the
system ensure that they perform as intended, prior to launching the implementation
and integration phase. Implementation Phase. In the implementation phase, the
organization configures and enables system security features, tests the
functionality of these features, installs or implements the system, and obtains a
formal authorization to operate the system. Design reviews and system tests should
be performed before placing the system into operation to ensure that it meets all
required security specifications. In addition, if new controls are added to the
application or the support system, additional acceptance tests of those new
controls must be performed. This approach ensures that new controls meet security
specifications and do not conflict with or invalidate existing controls. The
results of the design reviews and system tests should be fully documented, updated
as new reviews or tests are performed, and maintained in the organization’s
official records. . Operations/Maintenance Phase. In this phase, systems and
products are in place and operating, enhancements and/or modifications to the
system are developed and tested, and hardware and software components are added or
replaced. The organization should continuously monitor performance of the system to
ensure that it is consistent with pre-established user and security requirements,
and that needed system modifications are incorporated. Configuration management
(CM) and control activities should be conducted to document any proposed or actual
changes in the security plan of the system. Information systems are in a constant
state of evolution with upgrades to hardware, software, firmware, and possible
modifications in the surrounding environment. Documenting information system
changes and assessing the potential impact of these changes on the security of a
system are essential activities to assure continuous monitoring, and prevent lapses
in the system security accreditation. Disposal Phase. In this phase, plans are
developed for discarding system information, hardware, and software and making the
transition to a new system. The information, hardware, and software may be moved to
another system, archived, discarded, or destroyed. If performed improperly, the
disposal phase can result in the unauthorized disclosure of sensitive data. When
archiving information, organizations should consider the need for and the methods
for future retrieval. Usually, there is no definitive end to a system. Systems
normally evolve or transition to the next generation because of changing
requirements or improvements in technology. System security plans should
continually evolve with the system. Much of the environmental, management, and
operational information for the original system should still be relevant and useful
when the organization develops the security plan for the follow-on system. The
disposal activities ensure the orderly termination of the system and preserve the
vital information about the system so that some or all of the information may be
reactivated in the future, if necessary. Particular emphasis is given to proper
preservation of the data processed by the system so that the data is effectively
migrated to another system or archived in accordance with applicable records
management regulations and policies for potential future access. The removal of
information from a storage medium, such as a hard disk or tape, should be done in
accordance with the organization’s security requirements.

You might also like