System Development Life Cycle (SDLC)
The System Development Life Cycle (SDLC) is a structured framework used to guide the planning, development, deployment, and maintenance of information systems while integrating governance, risk management, and compliance (GRC) principles at every stage. In the context of Certified in Governance, Ri… The System Development Life Cycle (SDLC) is a structured framework used to guide the planning, development, deployment, and maintenance of information systems while integrating governance, risk management, and compliance (GRC) principles at every stage. In the context of Certified in Governance, Risk and Compliance (CGRC) and Security and Privacy Governance, SDLC ensures that security, privacy, and regulatory requirements are embedded throughout a system's lifecycle rather than being addressed as an afterthought. The SDLC typically consists of several key phases: Initiation, Development/Acquisition, Implementation, Operations/Maintenance, and Disposal. During the Initiation phase, business needs are identified, and a preliminary risk assessment is conducted to determine security and privacy requirements. In the Development/Acquisition phase, system architecture is designed, security controls are selected, and risk assessments are refined. The Implementation phase involves integrating security controls, conducting security testing, and obtaining authorization to operate through a formal assessment and authorization process. During Operations/Maintenance, continuous monitoring ensures that security controls remain effective, vulnerabilities are managed, and compliance with applicable laws and regulations is maintained. Finally, the Disposal phase ensures that data is securely sanitized and system components are properly decommissioned. From a GRC perspective, SDLC plays a critical role in ensuring that organizations meet regulatory requirements such as NIST Risk Management Framework (RMF), FISMA, GDPR, and HIPAA. Risk management is woven into each phase, enabling organizations to identify, assess, and mitigate risks proactively. Security and privacy governance ensures that policies, standards, and procedures are followed throughout the lifecycle. By incorporating GRC principles into SDLC, organizations achieve a proactive security posture, reduce vulnerabilities, maintain regulatory compliance, and ensure accountability. This integration supports the overall mission of protecting sensitive information, maintaining stakeholder trust, and enabling informed decision-making through continuous risk assessment and compliance monitoring throughout the entire system lifecycle.
System Development Life Cycle (SDLC) – A Comprehensive Guide for Governance, Risk & Compliance
Introduction
The System Development Life Cycle (SDLC) is a structured framework used by organizations to plan, design, develop, test, deploy, and maintain information systems. Within the context of Security, Privacy, Governance, Risk, and Compliance (GRC), the SDLC is a critical concept because it ensures that security and privacy controls are embedded into every phase of a system's life — from inception to retirement. Understanding SDLC is essential for professionals pursuing certifications such as CISSP, CISM, CISA, CRISC, Security+, and CGRC (Certified in Governance, Risk and Compliance).
Why Is SDLC Important?
1. Security by Design: SDLC ensures that security is not an afterthought. By integrating security requirements from the earliest phases, organizations reduce the risk of costly vulnerabilities being discovered late in the process or, worse, in production environments.
2. Regulatory Compliance: Many regulations and frameworks — including NIST SP 800-37, FISMA, HIPAA, PCI DSS, and GDPR — require organizations to demonstrate that systems are developed and maintained with appropriate security controls. SDLC provides the structured approach needed to meet these requirements.
3. Risk Management: Each phase of the SDLC includes risk assessment and mitigation activities. This proactive approach means that threats and vulnerabilities are identified and addressed systematically rather than reactively.
4. Cost Efficiency: The cost of fixing a security flaw increases exponentially the later it is discovered. Fixing a vulnerability during the design phase is significantly cheaper than fixing it after deployment. SDLC front-loads security work to save time and money.
5. Accountability and Governance: SDLC provides clear documentation, milestones, and decision gates that support governance processes. It ensures that management has oversight and that responsibilities are clearly defined throughout the system's life.
6. System Quality and Reliability: A well-implemented SDLC results in systems that are more reliable, more secure, and better aligned with business objectives.
What Is the SDLC?
The SDLC is a process model that describes the stages a system goes through from initial concept to eventual decommissioning. While different organizations and frameworks may define slightly different phases, the most commonly recognized phases are:
Phase 1: Initiation (Conceptual Planning)
This is where the need for a new or modified system is identified. A preliminary business case is developed, and the project scope is defined. From a security perspective, this phase includes:
- Identifying initial security requirements
- Conducting a preliminary risk assessment
- Classifying the sensitivity and criticality of the data the system will handle
- Identifying applicable regulatory and compliance requirements
- Assigning the system owner and information security roles
Phase 2: System Requirements Analysis (Development/Acquisition)
Detailed functional and security requirements are defined. This phase answers the question: What must the system do, and how must it be protected? Activities include:
- Defining detailed security and privacy requirements
- Performing a formal risk assessment (e.g., using NIST SP 800-30)
- Identifying security controls from applicable frameworks (e.g., NIST SP 800-53)
- Developing the security plan
- Evaluating make-vs-buy decisions with security implications
Phase 3: Design
The system architecture and detailed design are created. Security is woven into the design through:
- Designing security architecture (defense in depth, least privilege, separation of duties)
- Developing detailed security control specifications
- Designing audit and logging mechanisms
- Creating data flow diagrams to identify where sensitive data resides and moves
- Performing threat modeling (e.g., STRIDE, DREAD, or attack trees)
- Reviewing the design for compliance with security policies and standards
Phase 4: Development (Coding/Implementation)
The system is built or acquired. Security activities include:
- Secure coding practices (input validation, output encoding, parameterized queries, etc.)
- Code reviews and static application security testing (SAST)
- Configuration management and version control
- Developing security test plans
- Ensuring separation of development, test, and production environments
- Building in logging, monitoring, and error handling mechanisms
Phase 5: Testing and Validation
The system is rigorously tested to verify it meets requirements, including security requirements. Key activities:
- Security testing (penetration testing, vulnerability scanning, dynamic application security testing — DAST)
- Security control assessment and validation
- User acceptance testing (UAT) with security scenarios
- Certification testing — verifying the system meets security requirements
- Regression testing to ensure changes have not introduced new vulnerabilities
- Developing the Security Assessment Report (SAR)
Phase 6: Implementation/Deployment
The system is installed and made operational. Security activities include:
- Security authorization (formerly known as accreditation) — the authorizing official formally accepts residual risk
- Deploying security controls into the production environment
- Conducting final security configuration review
- Training end users on security procedures
- Updating the system security plan
- Activating monitoring and incident response capabilities
Phase 7: Operations and Maintenance
The system is in active use. This is typically the longest phase. Ongoing security activities include:
- Continuous monitoring of security controls
- Patch management and vulnerability remediation
- Configuration management and change control
- Incident detection and response
- Periodic risk reassessments
- Ongoing security awareness training
- Re-authorization as needed (e.g., when significant changes occur)
- Reviewing audit logs and security metrics
Phase 8: Disposition (Sunset/Retirement)
When a system is no longer needed, it must be securely decommissioned. Activities include:
- Archiving or securely migrating data as required by retention policies
- Sanitizing or destroying media (following NIST SP 800-88 guidelines)
- Revoking user access and decommissioning accounts
- Updating the system inventory
- Documenting lessons learned
- Ensuring compliance with data retention and destruction regulations
- Closing out the system security plan
How Does SDLC Work in the Context of GRC?
In a GRC context, SDLC serves as the backbone for integrating security and compliance activities into the system lifecycle. Here is how it connects:
Governance: SDLC provides the structure and decision gates that allow senior management and governance bodies to exercise oversight. Each phase has defined deliverables, approvals, and reviews. The system owner, authorizing official, and information security officer all have defined roles within the SDLC.
Risk Management: Risk assessment is not a one-time event; it is iterative throughout the SDLC. Initial risk assessments during initiation become more detailed during requirements and design, and are validated during testing. During operations, continuous monitoring ensures that new risks are identified and managed.
Compliance: The SDLC ensures that all applicable laws, regulations, and organizational policies are identified early and addressed throughout the system's development and operation. The security authorization process (as defined in NIST SP 800-37, the Risk Management Framework) is tightly integrated with the SDLC.
The Relationship Between SDLC and the Risk Management Framework (RMF)
For CGRC and CISSP candidates, it is crucial to understand how the NIST Risk Management Framework (RMF) maps to the SDLC:
- RMF Step 1 — Prepare: Aligns with SDLC Initiation
- RMF Step 2 — Categorize: Aligns with SDLC Initiation/Requirements (using FIPS 199 and NIST SP 800-60)
- RMF Step 3 — Select: Aligns with SDLC Requirements/Design (selecting security controls from NIST SP 800-53)
- RMF Step 4 — Implement: Aligns with SDLC Development/Implementation
- RMF Step 5 — Assess: Aligns with SDLC Testing/Validation
- RMF Step 6 — Authorize: Aligns with SDLC Implementation (the go/no-go decision)
- RMF Step 7 — Monitor: Aligns with SDLC Operations and Maintenance
Key SDLC Models You Should Know
1. Waterfall Model: A linear, sequential approach where each phase must be completed before the next begins. Simple but inflexible. Best for well-understood projects with stable requirements.
2. V-Model (Verification and Validation): An extension of waterfall where each development phase has a corresponding testing phase. Emphasizes testing and validation at every stage.
3. Iterative/Incremental Model: The system is developed in small increments, with each iteration producing a working version. Allows for feedback and adaptation.
4. Spiral Model: Combines iterative development with systematic risk analysis. Each loop of the spiral represents a phase, and risk assessment drives decision-making. This model is particularly relevant for exam questions because of its emphasis on risk.
5. Agile: An adaptive, people-centric approach that delivers software in short sprints. Security must be integrated into each sprint (DevSecOps). Challenges include ensuring adequate documentation and security review within rapid cycles.
6. DevOps/DevSecOps: Integrates development, security, and operations into a continuous pipeline. Security is automated and embedded (shift-left security). Key practices include CI/CD pipelines with automated security testing, infrastructure as code, and continuous monitoring.
7. Rapid Application Development (RAD): Emphasizes rapid prototyping and user feedback over detailed planning. Security can be a challenge due to the speed of development.
Security Considerations Across the SDLC
- Separation of Duties: Developers should not have access to production environments. Different teams should handle development, testing, and deployment.
- Change Management: All changes to the system must go through a formal change control process, especially during operations and maintenance.
- Configuration Management: Baseline configurations should be established and maintained. Deviations should be detected and corrected.
- Documentation: Each phase should produce security-relevant documentation, including security plans, risk assessments, test results, and authorization decisions.
- Least Privilege: Access controls should enforce least privilege at every phase.
- Data Protection: Sensitive data used in testing should be sanitized or synthetic. Production data should not be used in development/test environments without proper controls.
Exam Tips: Answering Questions on System Development Life Cycle (SDLC)
1. Know the Phases Cold: Be able to list and describe all SDLC phases in order. Many exam questions test whether you can identify which activity belongs to which phase. For example, "When should a risk assessment first be performed?" — the answer is during the Initiation phase.
2. Security Is Integrated, Not Bolted On: If a question presents a scenario where security is added after development, the correct answer will almost always point to integrating security earlier. The exam favors the principle of security by design.
3. Understand the Cost-of-Fixing Principle: Exam questions may test the concept that the cost of fixing security defects increases dramatically in later phases. The correct answer will emphasize addressing security as early as possible.
4. Map RMF to SDLC: For CGRC specifically, you must understand how the NIST RMF steps align with SDLC phases. Questions may ask which RMF activity occurs during a specific SDLC phase or vice versa.
5. Authorization vs. Certification: Understand the difference. Certification (now called Assessment) is the technical evaluation of security controls. Authorization (formerly Accreditation) is the management decision to accept residual risk and allow the system to operate. Authorization occurs at the Implementation phase.
6. Disposition Is a Real Phase: Do not overlook the disposition/retirement phase. Exam questions frequently test whether candidates remember that media sanitization, data archiving, and access revocation are required when a system is decommissioned.
7. Know the SDLC Models: Be prepared to identify the characteristics of each model (Waterfall, Spiral, Agile, V-Model, etc.). The Spiral model is frequently tested because of its emphasis on risk analysis. Agile is tested because of its growing adoption and the unique security challenges it presents.
8. Separation of Environments: Questions about secure development practices often test whether you know that development, testing, and production environments must be separated. The correct answer will always enforce this separation.
9. Watch for Distractor Answers: Some answer choices may describe legitimate security activities but place them in the wrong SDLC phase. Always match the activity to the correct phase. For example, penetration testing belongs in the Testing phase, not in the Design phase.
10. Change and Configuration Management: These are critical during the Operations and Maintenance phase. If a question describes a production system being modified, the correct answer will involve formal change control procedures.
11. Continuous Monitoring: Remember that security does not end at authorization. The Operations and Maintenance phase requires continuous monitoring, periodic reassessment, and re-authorization when significant changes occur.
12. Think Like a Manager, Not a Technician: GRC-focused exams want you to think about governance, oversight, accountability, and risk-based decision-making. When in doubt, choose the answer that emphasizes process, documentation, management approval, and risk acceptance over purely technical solutions.
13. Understand Roles: Know the key roles in the SDLC — System Owner (responsible for the system), Information Owner/Steward (responsible for the data), Authorizing Official (accepts risk and grants authorization), Security Control Assessor (evaluates controls), and Information System Security Officer (manages day-to-day security). Questions may test who is responsible for specific decisions.
14. Use Process of Elimination: If you are unsure, eliminate answers that suggest skipping phases, deferring security to later stages, or bypassing formal approval processes. The SDLC is fundamentally about structured, disciplined, and secure system development.
15. Remember Key Documents: Be familiar with key documents produced during the SDLC: System Security Plan (SSP), Security Assessment Report (SAR), Plan of Action and Milestones (POA&M), and Authorization to Operate (ATO). Know which phase produces each document.
Summary
The SDLC is a foundational concept in information security governance, risk management, and compliance. It provides the structured approach necessary to ensure that systems are developed, deployed, operated, and retired securely. For exam success, focus on understanding the phases, the security activities within each phase, the relationship between SDLC and the NIST RMF, and the governance principles that underpin the entire process. Security must be integrated from the very beginning and maintained throughout the system's entire life cycle — this is the core message that exam questions will test again and again.
Unlock Premium Access
Certified in Governance, Risk and Compliance
- Access to ALL Certifications: Study for any certification on our platform with one subscription
- 2520 Superior-grade Certified in Governance, Risk and Compliance practice questions
- Unlimited practice tests across all certifications
- Detailed explanations for every question
- CGRC: 5 full exams plus all other certification exams
- 100% Satisfaction Guaranteed: Full refund if unsatisfied
- Risk-Free: 7-day free trial with all premium features!