Skip to content

Latest commit

 

History

History
18 lines (14 loc) · 380 Bytes

File metadata and controls

18 lines (14 loc) · 380 Bytes

Module 2: Secure Software Lifecycle

Stages

  1. Requirements
  2. Design
  3. Implementation
  4. Testing
  5. Deployment & Maintenance

Practices

  • Shift-left security (earlier detection).
  • Security gates in Agile/DevOps pipelines.

Models

  • Waterfall vs. Agile vs. DevSecOps.

Key Point

Security activities should be integrated, automated, and continuous.