1.

Record Nr.

UNINA9910698257203321

Autore

Grance Timothy

Titolo

Security considerations in the information system development life cycle [[electronic resource] ] : recommendations of the National Institute of Standards and Technology / / Tim Grance, Joan Hash, Marc Stevens ; Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology

Pubbl/distr/stampa

Gaithersburg, Md., : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2004]

Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2004]

Edizione

[Rev.]

Descrizione fisica

1 volume (various pagings) : digital, PDF file

Collana

NIST special publication ; ; 800-64. Computer security

NIST special publication ; ; 800-64 Rev. 1

Disciplina

005.8

Soggetti

Information technology - Security measures - United States

Computer networks - Security measures - United States

Computer security - Standards - United States

Information technology - Management

Federal government - Computer networks - Security measures - United States

Administrative agencies - Information technology - Security measures - United States

Administrative agencies - United States - Information technology - Management

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Title from title screen.

"June 2004."

Nota di bibliografia

Includes bibliographical references.

Sommario/riassunto

The need to provide protection for federal information systems has been present since computers were first used. Including security early in the acquisition process for an information system will usually result



in less expensive and more effective security than adding it to an operational system once it has entered service. This guide presents a framework for incorporating security into all phases of the information system development life cycle (SDLC) process, from initiation to disposal. This document is a guide to help organizations select and acquire cost-effective security controls by explaining how to include information system security requirements in the SDLC.Five phases of a general SDLC are discussed in this guide and include the following phases: initiation, acquisition/development, implementation, operations/maintenance, and disposition. Each of these five phases includes a minimum set of security steps needed to effectively incorporate security into a system during its development. An organization will either use the general SDLC described in this document or will have developed a tailored SDLC that meets their specific needs. In either case, NIST recommends that organizations incorporate the associated IT security steps of this general SDLC into their own development process.