

Auditing System Development Lifecycle
Audit Guidelines On How To Review
SDLC Framework
By
Nandasena T(NT) Hettigei
CISA, CISSP, CITP, CPA, CA
Copyrights © NTH 2007
Presented at ISACA Roundtable on 12/12/2007 at KPMG Training Center, Wells Fargo Building
Minneapolis, MN
SANS @Night
Chicago, IL - September 3 - 10, 2008
Converging Security in SDLC
NT HETTIGEI
CISSP, CISA, CITP, CPA, ACA (SL)
Safeguarding critical and sensitive information assets has become a business requirement, not only due to compliance needs, but also to gain a competitive edge in the modern business landscape. This is true especially when you are in the business of developing systems and applications to support other businesses. In the modern business world, to gain a competitive edge, companies need to be connected to the internet and provide effective and efficient services. Therefore, information security is becoming more important than ever before in order to safeguard business-sensitive information, trade secrets, and intellectual property.
Mitigating the risk of non-compliance and ensuring adequate security over critical and sensitive information should begin with a thorough business and business systems analysis. Post implementation costs of security and compliance controls will be high and also disruptive to the production environment. Therefore, the security requirements must no longer be buried as non-functional specifications of the system development life cycle (SDLC) methodology.
This session will identify key components of the three common SDLC methodologies (Waterfall, Iterative, and Agile) as controls that should be considered when implementing and/or auditing the organization's system development life cycle. This will provide guidelines for understanding, scoping, evaluating, and communicating SDLC control gaps, including the integration of security components into the SDLC. It will also broaden the understanding of integration points and help understand where and how security fits into SDLC while providing an approach that is practical and applicable across different SDLC methodologies. Attendees will learn more about:
Components and controls within common SDLC methodologies
Evaluation and determination of the relevance of different SDLC methodologies
Risk-based and practical approaches to implement security in SDLC
When and how to consider application and system security within SDLC
Auditor's role as a risk and controls subject matter expert (SME)
----------------------------------------------------------------------------------------------------------------------------------------------
© 2000-2008 The SANS™ Institute
SANS Web Privacy Policy: www.sans.org/privacy.php - Web Contact: webmaster@sans.org
SANS Press Room: www.sans.org/press / Policy On SANS Trademark Usage
SANS Institute - SANS Audit & Compliance 2008 - SANS @Night http://www.sans.org/chicago08/night.php
SANS2004 Annual Conference
Orlando, Florida| April 1-9, 2004
SANS@Night
Tuesday April 6th,2004
BY
NT HETTIGEI
CISA, CITP, CPA, ACA (SL)Converging Security in SDLC
Auditing Internet Commerce Security Design & Build - An Audit Approach for IT Development Projects and its Security Infrastructure