Project Life Cycle Security Measures

Company Name: Cisco Systems(OEM Routing/Switching equipment) Project Outline and Requirements Give a brief description of Me company (can be hypothetical) where the Data and Applications Security Impact Analysis and Mitigation Report will be implemented. Include the types of information and data that are processed by the company. the company size, location(s), and other pertinent information. Project Life Cycle Security Measures Give a summary of the security measures to be taken at the planning. requirements, design, development, integration and testing. and installation and acceptance phases of the project life cycle to include the following: Planning phase: Identify what work products the team will have that will change, or are likely to change, and the functional relationships between those products. Requirements phase: Identify the requirements and the functional software verifying the identity of a user. Provide any requirements that are applicable to your cryptographic module. FIPS PBU140-2 Security Requirements for Cryptographic Modules can be used as a guideline. Design phase: Describe how the design team ensures that the software component has trusted modules. Development phase: Describe how developers will ensure that the application being developed for the cryptographic algorithm will be secure and protective of sensitive data. Integration and test phase: Identify what will be tested during this phase and the general integration and test procedures that will be used. Installation and acceptance phase: Identify the purpose of the installation and acceptance phase for both the user and the organization.

Sample Solution