Skip navigation

Secure Design Lifecycle

  1. Design (architecture)
  2. Planning & procurement (secure supply chain)
  3. Development (trusted methodologies)
    • i/o validation, error handling
    • Developing to addressing threats (Phishing, Spam, Malware…)
    • Secure session, communication, storage, resource access mgt.
  4. Testing and Verification
  5. Metrics