官术网_书友最值得收藏!

The Secure Development Life Cycle (SDLC)

How security is handled in the development life cycle is frequently a reflection of the industry and its conventional or dictated development methodologies. Some product types, such as aircraft or cars, are simply not amenable to pure Agile development methodologies, because of the complexity and dependencies built into their supply chains, and the absolute nature of the intermediate and final delivery dates of their products.

Regardless, in many cases, development organizations do have some latitude when selecting a development methodology. This section spells out common development approaches and provides guidance on implementing security rigor within those approaches.

When selecting a development methodology, building security in from the beginning means that well-thought-out security, safety, and privacy requirements are elicited, and made traceable throughout the development and update of an IoT device or system. By system, we mean a collection of IoT devices, applications, and services that are integrated to support a business function.

Templated approaches are available that can be applied to any development effort. Microsoft's Security Development Lifecycle (https://www.microsoft.com/en-us/sdl/), for example, incorporates multiple phases: training, requirements, design, implementation, verification, release, and response.

Whichever security life cycle is chosen, it is overlaid on a preferred development approach. Popular methodologies today include waterfall, Spiral, Agile, and DevOps. We discuss each methodology here. 

主站蜘蛛池模板: 吉木乃县| 凌云县| 金堂县| 新竹县| 和田市| 靖安县| 长宁区| 栖霞市| 利川市| 肇源县| 凭祥市| 油尖旺区| 林甸县| 苗栗县| 巧家县| 临朐县| 江永县| 鄂托克前旗| 嘉兴市| 扎鲁特旗| 旬阳县| 博客| 大方县| 海南省| 五河县| 巴彦淖尔市| 吴堡县| 阜新| 清原| 犍为县| 安龙县| 黄梅县| 留坝县| 印江| 察隅县| 河津市| 盈江县| 江门市| 蛟河市| 峨山| 荥阳市|