Open In App

Integrating Risk Management in SDLC | Set 3

Prerequisite – Integrating Risk Management in SDLC | Set 1, and Set 2.

We have already discussed the first four steps of the Software Development Life Cycle. In this article, we will be discussing the remaining four steps: Integration and System Testing, Installation, Operation and Acceptance Testing, Maintenance, and Disposal. We will discuss Risk Management in these four steps in detail.



5. Integration and System Testing

In this phase, first, all modules are independently checked for errors, bugs. Then they are related to their dependents and dependency is checked for errors finally all modules are integrated into one complete software and checked as a whole for bugs.

Support from Risk Management Activities

In this phase, designed controls are tested to see whether they work accurately in an integrated environment. This phase includes three activities: Integration Activity, Integration Testing Activity, and System Testing Activity. We will be discussing these activities in a bit more detail along with the risk factors in each activity.



6. Installation, Operation, and Acceptance Testing

This is the last and longest phase in SDLC. This system is delivered, installed, deployed, and tested for user acceptance.

Support from Risk Management Activities

The system owner will want to ensure that the prescribed controls, including any physical or procedural controls, are in place prior to the system going live. Decisions regarding risks identified must be made prior to system operation. This phase involves three activities: Installation, Operation, and Acceptance Testing.

7. Maintenance

In this stage, the system is assessed to ensure it does not become obsolete. This phase also involves continuous evaluation of the system in terms of performance and changes are made from time to time to initial software to make it up-to-date. Errors, and faults discovered during acceptance testing are fixed in this phase. This step involves making improvements to the system, fixing errors, enhancing services, and upgrading software.

Support from Risk Management Activities

Any change to a system has the potential to reduce the effectiveness of existing controls or to otherwise have some impact on the confidentiality, availability, or integrity of the system. The solution is to ensure that a risk assessment step is included in evaluating system changes.

8. Disposal

In this phase, plans are developed for discarding system information, hardware, and software to make the transition to a new system. The purpose is to prevent any possibility of unauthorized disclosure of sensitive data due to improper disposal of information. All of this should be done in accordance with the organization’s security requirements.

Support from Risk Management Activities

The Risk Management plan developed must also include threats to the confidentiality of residual data, proper procedures, and controls to reduce the risk of data theft due to improper disposal. However, by identifying the risk early in the project, the controls could be documented in advance ensuring proper disposition.

How To Integrate Risk Management in SDLC?

Integrating risk management into the Software Development Life Cycle (SDLC) is crucial for ensuring the development of secure and reliable software. Here are the ways to integrate Risk Management in SDLC.

Frequently Asked Questions

1. List some typical risk response strategies used in SDLC?

Answer:

In SDLC, there are four main risk response strategies:

  • Avoidance
  • Mitigation
  • Transfer
  • Acceptance

2. What differentiates Integrated Risk Management from Traditional Risk Management?

Answer:

Traditional Risk Management focuses on individual risks, while Integrated Risk Management also focuses on interactions between different risks.

3. List some common challenges that are faced while implementing Integrated Risk Management in SDLC?

Answer:

Some of the common challenges include:

  • resistance to change
  • difficulty in obtaining full support from all stakeholders
  • complex risk interdependencies,
  • data integration issues, etc.

Article Tags :