78 ◾ Official (ISC)
2
® Guide to the ISSMP® CBK®
© 2011 by Taylor & Francis Group, LLC
additional risks may be incurred. Prototyping with automated tools or wizards is
especially prone to having little or no security when code is generated, so constant
vigilance must be practiced to ensure that security is added before the prototype
code is included in the system.
In order to achieve the best results, security must be a carefully documented
part of the design generated in this stage of the SDLC.
is is also the stage where QA begins to develop a test plan, and security tests
must be an integral part of those plans as well. Successful completion of both pen-
etration and overall security testing is a necessary requirement in order to deploy
the system.
During this stage of the SDLC, the risk analysis is updated and a security
design document may be begun to demonstrate how and where security require-
ments t within the system as a whole. User stories and use cases, especially hacker
or attacker scenarios, are helpful ways to illustrate the security requirements and
better enable QA to test the system later. e security design document lives side by
side with and may be referenced by the system’s other design documents.
Implementation: Build the Project
is is the fourth SDLC stage and where the majority of development work is done,
and where the design created in the prior stage is turned into a working system.
During this stage, part of the security focus is to enforce adherence to the stan-
dards agreed on during the Requirements stage. Standards are only good if they are
actually used, and the impact of failing to adhere to these security standards is that
the associated security risks are not eectively mitigated.
Unit testing occurs as code is written, and some QA testing often starts on fea-
tures as soon as they are completed in this stage. While this stage continues, a watch
is kept on the defects being reported, especially any defects marked as being secu-
rity related. Finding these early and focusing on them allows both an opportunity
to catch security issues whose mitigations or xes are not correctly implemented as
well as a chance to nd and x previously unaddressed security concerns.
It’s also imperative that the risk analysis and security plan are kept up to date
as changes are made during the system’s actual development process. ese docu-
ments provide both the correct current information as well as serve as a historical
reference of the security-specic risks and mitigations for this system. is means
document change histories also need to be closely tracked and retained.
Verification: Test the Project
Stage ve of the SDLC is the Verication or test phase. In a strict waterfall method,
this would occur only after the prior stage is fully code complete, but this rarely
happens in practice anymore. Instead, testing and QA work typically begin back