Secure SDLC Policy PDF
Secure SDLC Policy PDF
Box 2062
Albany, NY 12220-0062
w w w .its.ny.gov
Information security must be adequately considered and built into every phase of the
SDLC. Failure to identify risks and implement proper controls can result in inadequate
security, potentially putting New York State Entities at risk of data breaches, reputational
exposure, loss of public trust, compromise to systems/networks, financial penalties and
legal liability.
2.0 Authority
Section 2 of Executive Order No. 117 provides the State Chief Information Officer, who
also serves as director of the Office of Information Technology Services (ITS), the
authority to oversee, direct and coordinate the establishment of information technology
policies, protocols and standards for State government, including hardware, software,
security and business re-engineering. Details regarding this authority can be found in
NYS ITS Policy NYS-P08-002, Authority to Establish State Enterprise Information
Technology (IT) Policy, Standards and Guidelines.
3.0 Scope
This standard is promulgated pursuant to New York State Information Technology
Policy NYS-P03-002, Information Security, and applies to ITS, all State Entities (SE)
that receive services from ITS, and affiliates of same (e.g., contractors, vendors,
solution providers), which have access to or manage SE information. It also serves as
recommended practice for the State University of New York, the City University of New
York, non-Executive branch agencies, authorities, NYS local governments and third
parties acting on behalf of same.
This standard covers all systems and applications developed for New York State
Entities (SEs), regardless of their current system life cycle phase. This includes all test,
quality control, production and other ad-hoc systems that exist within or external to SE
networks. This standard equally applies to systems developed by New York state staff
or by any third parties on behalf of New York State.
At a minimum, an SDLC must contain the following security activities. These activities
must be documented or referenced within an associated information security plan.
Documentation must be sufficiently detailed to demonstrate the extent to which each
security activity is applied. The documentation must be retained for auditing purposes.
NYS-S13-001 Page 2 of 5
12. Create Test Data
13. Test Security Controls
14. Perform Certification and Accreditation
15. Manage and Control Change
16. Measure Security Compliance
17. Perform System Disposal
Note: Data classification cannot be used as the sole determinate of whether or not the
project is low risk/cost. For example, public facing websites cannot be considered low
risk/cost projects even if all the data is public. There is a risk of compromise of the
website to inject malware and compromise visitor’s machines or to change the content
of the website to create embarrassment.
5.0 Compliance
This standard shall take effect upon publication. Compliance is expected with all
enterprise policies and standards. ITS may amend its policies and standards at any
time; compliance with amended policies and standards is expected.
NYS-S13-001 Page 3 of 5
6.0 Definitions of Key Terms
Except for terms defined in this standard, all terms shall have the meanings found in
http://www.its.ny.gov/glossary.
Term Definition
NYS-S13-001 Page 4 of 5
8.0 Revision History
This standard shall be subject to periodic review to ensure relevancy.
NIST Special Publication 800-53, Security and Privacy Controls for Federal Information
Systems and Organizations
NIST Special Publication 800-53A, Guide for Assessing Security Controls in Information
Systems & Organizations: Building Effective Assessment Plans
NYS-S13-001 Page 5 of 5
Appendix A: Security Activities within the SDLC
The table below shows the placement of security activities within the phases of a sample
SDLC. The actual placement of security activities within the system development life cycle
may vary in accordance with the actual SDLC being utilized in a project and the particular
security needs of the application or system. The NIST publications in the third column of
this table are recommended documents to provide guidance in the placement and execution
of security tasks within the system development life cycle. These documents are availabl e
from the NIST website (http://csrc.nist.gov/publications/PubsSPs.html).
4. Classify Information
As per NYS Information Security Policy, all information contained within, manipulated by or
passing through a system or application must be classified. Classification must reflect the
importance of the information’s confidentiality, integrity and availability.
As per the NYS Information Assurance Policy, all applications or systems which require
authentication must establish a user identity assurance level. The identity assurance level
must reflect the required confidence level that the person seeking to access the system is
who they claim to and the potential impact to the security and integrity of the system if the
person is not who they claim to be.
The purpose behind establishing system security profiles and monitoring them throughout
the lifecycle is to be actively aware of the relative priority, weight and relevance of each
security concept at each phase of the system’s life cycle. SE’s must verify that the security
Threat assessments must adhere to all relevant state and federal mandates to which the SE
must comply and follow industry best practices including the documentation of the
assessment processes. Threat assessments and the underlying threat modeling
deliverables that support the assessment must also be fully documented. Appendix E:
Threat and Risk Assessment Resources includes a list of recommended resources for
performing threat assessments.
All realistic threats and vulnerabilities identified in the threat assessments must be
addressed in the risk assessments. The risk assessments must be based on the value of
the information in the system, the classification of the information, the value of the business
function provided by the system, the potential threats to the system, the likelihood of
occurrence, the impact of the failure of the system and the consequences of the failure of
security controls.
The risk assessments must be periodically reviewed and updated as necessary whenever
the underlying threat assessment is modified or whenever significant changes are made to
the system. Appendix E: Threat and Risk Assessment Resources includes a list of
recommended resources for performing risk assessments.
Documentation of controls must be sufficiently detailed to enable verification that all systems
and applications adhere to all relevant security policies and to respond efficiently to new
threats that may require modifications to existing controls.
Residual risk must be documented and maintained at acceptable levels. A formal risk
acceptance, with executive management sign-off, must be performed for medium and high
risks that remain after mitigating controls have been implemented.
Confidential production data should not be used for testing purposes. If produc tion data is
used, SEs must comply with all applicable federal, state and external policies and standards
regarding the protection and disposal of production data.
The testing process, including regression testing, must demonstrate that all security controls
have been applied appropriately, implemented correctly and are functioning properly and
actually countering the threats and vulnerabilities for which they are intended. The testing
process must also include vulnerability testing and demonstrate the remediation of critical
vulnerabilities prior to placing the system into production.
Security compliance assessments must be performed after all system and application
changes and periodically as part of continuous system compliance monitoring.
Responsibility for each security activity within the SDLC must be assigned to one or more
security roles. To accomplish this, the default definition of an SDLC role may be
expanded to include security responsibilities and/or new security roles may be defined
to encompass security activities. In all cases, the assignment of security activities to
roles, and the identification of persons given responsibility for these roles, must be clearly
documented.
For the purpose of utilizing a consistent definition of roles across various SDLC’s, it is
highly recommended that SE’s utilize as guidelines the New York State Office of
Information Technology Services (ITS) Enterprise Program Management Office (EPMO)
and the National Institute of Standards and Technology (NIST) publications . Of specific
relevance to the definition of roles and SDLC frameworks are:
The makeup of a system and software from a security perspective is its security
profile and includes the following security concepts, which must be considered and
documented as part of a Secure SDLC process.
In order to assure alignment with business compliance mandates, and help assure
efficient and effective delivery of security services, the use of industry-recognized
standards related to risk-based frameworks and secure system development life cycle
practices are recommended.
In particular, the use of NIST standards is highly recommended, especially for SEs
required to comply with federal security mandates. The following NIST publications
provide recommended guidance for implementing risk management frameworks and
performing threat and risk assessments.