<< Previous    1...   30  31  [32]  33  34  ...155    Next >>

 

Project Managers need to address IT security threats and vulnerabilities early in the SDLC when the cost of implementing security controls and practices are relatively low and convenient to budget and schedule.  Moreover, adherence to security-based software development practices will prevent deficiencies, rather than implement them after the fact.  The cost to remediate a security weakness increases geometrically as a project moves through the SDLC. 

The SDLC must also include those activities which will ensure the incorporation of an adequate security control baseline into all phases of system development, operations, maintenance, and disposal.  Including information system security early in the SDLC for an information system will usually result in less expensive and more effective security than adding security to an operational system. NIST Special Publication 800-64, Security Considerations in the Information System Development Life Cycle, presents a framework for incorporating security into all phases of the SDLC process, from definition to disposal.

The  SDLC includes the following steps:

    Step 0: Concept Definition

    Step 1: Concept Development

    Step 2: System Design and Prototype

    Step 3: System Development and Testing

    Step 4: System Deployment

    Step 5: System Operation (including System Disposal)

Project Management Framework

The mapping of the IPMC Project Management Process and the IPMC life cycle identifies the project management outputs for each IPMC project management step and milestone review. It also shows the project management process groups with corresponding actions and artifacts identified by IPMC.

Figure 1.9 illustrates the actions and associated artifacts of the IPMC Project and Program Management process.

<< Previous    1...   30  31  [32]  33  34  ...155    Next >>