Activities in the SSDLC
To establish a secure software development platform, we have to understand what activities need to be performed in the SSDLC. With this understanding, we can then define which activities can be integrated and performed using the platform, especially when it comes to managing the activities and allowing for automation.
This section focuses on describing specific activities in the SSDLC. Various standards can be considered to help build a framework around SSDLC [1-3].
Note
The following is not an exhaustive list but provides an overview of common cybersecurity activities that can be used to establish a baseline of security. Please also note that some of the following activities require specified workflows with defined interactions between project teams and security teams to be established.
These cybersecurity activities have been mapped to a simplified V-model in Figure 7.1.
Figure 7.1 – Cybersecurity activities mapped...