CHAPTER 14: AUTHORIZATION AND THE SYSTEM LIFE CYCLE (SLC)

A common mistake that people make when trying to design something completely foolproof is to underestimate the ingenuity of complete fools.110

Douglas Adams, author of The Hitchhiker’s Guide to the Galaxy

In this chapter:

Phases of the system life cycle The phases and associated documentation

When do you really have to start paying attention to security requirements for your information system? The answer is – from the very earliest stages of planning for the system to its final disposal. By considering security early in the information system life cycle (SLC)111, you might avoid ...

Get The Definitive Guide to the C Transformation Process now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.