From the course: Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Development methodologies
From the course: Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program
Development methodologies
- [Instructor] Many organizations find themselves developing software, whether for their own internal use or developing it as a product for their customers. Security concerns must be taken into account at every phase of the software development process to ensure that the end result is safe, secure code that meets the organization's business requirements. Every software project should begin with a solid set of business requirements. Developers should work hand-in-hand with their customers to outline the specific purpose of the software and the details of the business goals that it will achieve. This process is known as requirements definition, and it's crucial to developing software that meets the organization's needs. After developing business requirements, software developers then move on and translate those requirements into a technical design. This is where technical experts lay out the roadmap for software development and…