1.Overview of The NIST 800-64 rev2An basic idea of NIST 800-64 rev2
Basic overview The National Institute of Standards and Technology (NIST) Special Publication (SP) 800- 64, Security Considerations in the System Development Life Cycle, is developed so that it is possible to assist federal government agencies as it is often complex to integrate essential information technology (IT) security steps with the established IT system development life cycle (SDLC) 3
Meaning of SDLC System development life cycle (SDLC) is an integral part of development of any IT system. it basically consists of various cycles that are required to complete the development process of any proposed IT system. basically it consists of system planning, execution, system development and system maintenance. 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Importance of scurity in SDLC â–°provides security to system and information it process â–°Provides enhanced system maintenance and also reduce cost for system management â–°increase organizational value through effective and secure data management 5
Phases of SDLC security integration There are total six phases involved in securing SDLC and those are: â–°Investigation â–°Analysis â–°Logical design â–°Physical design â–°Implementation â–°Maintenance andchange 6
SDLC security integration phases Investigation â–°Process, outcome and goal identification â–°problems analysis â–°Project scope identification â–°constraints identifucation with Analysis â–°review of existing security policies â–°Review of legal issues â–°execution of risk analysis logical design â–°Development of security blueprint â–°planning for incident response â–°Planning for business response for disaster â–°Feasibility review of outsourcing project7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SDLC security integration phases Physical design â–°Technology selection to support security blue print â–°Physical security measure design â–°Project review and approval Implementation â–°purchase or development of security solutions â–°presentation of tested package for management approval Maintenance and change â–°monitoring, testing, modifying and update in constant basis for meeting threats due to the change process 8