Software Development Lifecycle Policy

Purpose and Scope

a. The purpose of this policy is to define requirements for establishing and maintaining baseline protection standards for company software, network devices, servers, and desktops.

b. This policy applies to all users performing software development, system administration, and management of these activities within the organization. This typically includes employees and contractors, as well as any relevant external parties involved in these activities (hereinafter referred to as “users”). This policy must be made readily available to all users.

c. This policy also applies to enterprise-wide systems and applications developed by the organization or on behalf of the organization for production implementation.

Background

a. The intent of this policy is to ensure a well-defined, secure and consistent process for managing the entire lifecycle of software and information systems, from initial requirements analysis until system decommission. The policy defines the procedure, roles, and responsibilities, for each stage of the software development lifecycle.

b. Within this policy, the software development lifecycle consists of requirements analysis, architecture and design, development, testing, deployment/implementation, operations/maintenance, and decommission. These processes may be followed in any form; in a waterfall model, it may be appropriate to follow the process linearly, while in an agile development model, the process can be repeated in an iterative fashion.

Policy

a. The organization’s Software Development Life Cycle (SDLC) includes the following phases:

i. Requirements Analysis

ii. Architecture and Design

iii. Testing

iv. Deployment/Implementation

v. Operations/Maintenance

vi. Decommission

b. During all phases of the SDLC where a system is not in production, the system must not have live data sets that contain information identifying actual people or corporate entities, actual financial data such as account numbers, security codes, routing information, or any other financially identifying data. Information that would be considered sensitive must never be used outside of production environments.

c. The following activities must be completed and/or considered during the requirements analysis phase:

d. The following must be completed/considered during the architecture and design phase:

e. The following must be completed and/or considered during the development phase:

f. The following must be completed and/or considered during the testing phase:

g. The following must be completed and/or considered during the deployment phase:

h. The following must be completed and/or considered during the operations/maintenance phase:

i. The following must be completed and/or considered during the decommission phase:

Last updated