Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
12 views5 pages

File Download

This document outlines the policy for the Software Development Life Cycle (SDLC) at Atishay Limited, detailing the phases including Requirement Analysis, Architecture and Design, Development, Testing, and Deployment. It emphasizes the importance of a secure and consistent process for managing software and information systems, along with specific activities to be completed at each phase. The policy also mandates that sensitive data must not be used outside of production environments.

Uploaded by

jeffrey.wong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views5 pages

File Download

This document outlines the policy for the Software Development Life Cycle (SDLC) at Atishay Limited, detailing the phases including Requirement Analysis, Architecture and Design, Development, Testing, and Deployment. It emphasizes the importance of a secure and consistent process for managing software and information systems, along with specific activities to be completed at each phase. The policy also mandates that sensitive data must not be used outside of production environments.

Uploaded by

jeffrey.wong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

11/12/2023

POLICY OF THE SOFTWARE DEVELOPMENT


LIFE CYCLE (SDLC)

SUBMITTED BY
ATISHAY LIMITED
Jaipur
Policy of the Software Development life cycle

Table of Contents
1. Introduction: ....................................................................................................................... 2
1.1. Purpose............................................................................................................................. 2
1.2. Background ......................................................................................................................... 2
2. Policy ................................................................................................................................... 2

Policy of the Software development life cycle


Document Version 1.0

Document Prepared By Pankaj Jaldeep, ACP(DD) Date: 11-12-2023

Reviewed By/Approved Ranveer Singh, SA(JD) Date: 19-12-2023


BY

pg. 1
Policy of the Software Development life cycle

1. Introduction:
1.1. Purpose
The purpose of this document is to present a detailed policy for the software
development life cycle (SDLC). It will explain all the phases of the software development
life cycle such as Requirement Analysis, Architecture, and design, Development, Testing,
and Deployment.

1.2. Background
a. this policy intends to ensure a well-defined, secure, and consistent process for
managing the entire lifecycle of software and information systems, from initial
requirements analysis until system decommission. The policy defines the procedure,
roles, and responsibilities, for each stage of the software development lifecycle.
b. Within this policy, the software development lifecycle consists of requirements
analysis, architecture and design, development, testing,
deployment/implementation, and operations/maintenance. These processes may be
followed in any form; in an agile development model, the process can be repeated
iteratively.

2. Policy

a. The organization’s Software Development Life Cycle (SDLC) includes the following
phases:
i. Requirements Analysis
ii. Architecture and Design
iii. Testing.
iv. Deployment/Implementation.
v. Operations/Maintenance.
b. During all phases of the SDLC where a system is not in production, the system must
not have live data sets that contain information identifying actual people or corporate
entities, actual financial data such as account numbers, security codes, routing
information, or any other financially identifying data. Information that would be
considered sensitive must never be used outside of production environments.

c. The following activities must be completed and/or considered during the


requirements analysis phase:
i. Analyze business requirements.
ii. Perform a risk assessment

pg. 2
Policy of the Software Development life cycle

iii. Discuss aspects of security (e.g., confidentiality, integrity, availability) and how
they might apply to this requirement.
iv. Review regulatory requirements and the organization’s policies, standards,
procedures and guidelines.
v. Develop and prioritize security solution requirements.

d. The following must be completed/considered during the architecture and design


phase:
i. Educate development teams on how to create a secure system
ii. Develop and/or refine infrastructure security architecture.
iii. List technical and non-technical security controls.
iv. Perform architecture walkthrough.
v. Create a system-level security design.
vi. Create high-level non-technical and integrated technical security designs
vii. Document the detailed technical security design.
viii. Perform a design review, which must include, at a minimum, technical reviews
of application and infrastructure, as well as a review of high-level processes.
ix. Describe detailed security processes and procedures, including segregation of
duties and segregation of development, testing and production environments.

e. The following must be completed and/or considered during the development phase:
i. Set up a secure development environment (e.g., servers, storage).
ii. Train infrastructure teams on installation and configuration of applicable
software, if required.
iii. Develop code for application-level security components.
iv. Install, configure and integrate the test infrastructure.
v. Set up security-related vulnerability tracking processes
vi. Develop a detailed security test plan for current and future versions (i.e.,
regression testing).
vii. Conduct unit testing and integration testing

f. The following must be completed and/or considered during the testing phase:
i. Perform a code and configuration review through both static and dynamic
analysis of code to identify vulnerabilities.
ii. Test configuration procedures.
iii. Perform system tests
pg. 3
Policy of the Software Development life cycle

iv. Conduct performance and load tests with security controls enabled.
v. Perform usability testing of application security controls.
vi. Conduct independent vulnerability assessments of the system, including the
infrastructure and application.

g. The following must be completed and/or considered during the deployment phase:
i. Conduct pilot deployment of the infrastructure, application and other relevant
components.
ii. Conduct transition between pilot and full-scale deployment.
iii. Perform integrity checking on system files to ensure authenticity

h. The following must be completed and/or considered during the


operations/maintenance phase:
i. Administering users and access
ii. Performing backups according to requirements defined in the System Availability
Policy
iii. Performing system maintenance
iv. Conducting periodic system vulnerability assessments.

The End

pg. 4

You might also like