Why SDLC Controls are important for a project. Jason D. Lannen CISA, CISM August 21, 2013 11:15 AM



Similar documents
INFORMATION TECHNOLOGY STANDARD

TIBCO Spotfire and S+ Product Family

Template K Implementation Requirements Instructions for RFP Response RFP #

Project Risk and Pre/Post Implementation Reviews

- ATTACHMENT - PROGRAM MANAGER DUTIES & RESPONSIBILITIES MARYLAND STATE POLICE W00B

Test Plan (a Real Sample) SoftwareTestingHelp.com Live Project Training - OrangeHRM

Quality Assurance - Karthik

ATTACHMENT 3 SPS PROJECT SENIOR PROGRAM MANAGER (SPM) DUTIES & RESPONSIBILITIES

SAS No. 70, Service Organizations

Implementation of PeopleSoft 8.9

14 October 2015 ISACA Curaçao Conference By: Paul Helmich

IT Risk & Security Specialist Position Description

The Final Quality Gate: Software Release Readiness. Nancy Kastl, CSQA Kaslen Group, Inc. (630)

Development, Acquisition, Implementation, and Maintenance of Application Systems

IT Audit in the Cloud

Welcome to the Audit, Control & Security Stream. Sponsored by:

How To Write An Slcm Project Plan

COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30

VeriSolv Technologies, Inc. Capabilities Briefing

Effectively Assessing IT General Controls

Rally Integration with BMC Remedy through Kovair Omnibus Kovair Software, Inc.

Control Design & Implementation Week #5 CRISC Exam Prep ~ Domain #4. Bill Pankey Tunitas Group. Job Practice

PHASE 5: DESIGN PHASE

Strategies for Project Recovery» A P M S O L U T I O N S R E S E A R C H R E P O R T

PROGRAM / PROJECT MANAGEMENT: Effective Requirements Gathering and Management Presented by: Karen Yvonne Lucas, PMP

An Integrated Approach to Performing Pre-implementation Reviews. Securities Industry and Financial Markets Association February 29, 2012

OBLIGATION MANAGEMENT

Network Configuration Management

The Unique Alternative to the Big Four. Identity and Access Management

Effective Software Security Management

Best Practices Report

State of Oregon. State of Oregon 1

MIS Systems & Infrastructure Lifecycle Management 1. Week 13 April 14, 2016

Enterprise Application Security Program

ICTEC. IT Services Issues HELSINKI UNIVERSITY OF TECHNOLOGY 2007 Kari Hiekkanen

High End Information Security Services

Auditing the Software Development Lifecycle ISACA Geek Week. Mike Van Stone Sekou Kamara August 2014

Domain 1 The Process of Auditing Information Systems

CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office

Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

POLAR IT SERVICES. Business Intelligence Project Methodology

Rapidly Defining a Lean CMMI Maturity Level 3 Process

Data Warehouse. Project Process. Project Documentation. Revised Aril, 2013

Orchestrated. Release Management. Gain insight and control, eliminate ineffective handoffs, and automate application deployments

Dallas IIA Chapter / ISACA N. Texas Chapter. January 7, 2010

Project Management. An Overview for IT. Author: Kevin Martin & Denise Reeser

SOC Readiness Assessments. SOC Report - Type 1. SOC Report - Type 2. Building Trust and Confidence in Third-Party Relationships

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

The Information Systems Audit

CISM ITEM DEVELOPMENT GUIDE

DECOMMISSIONING CASE : SIEBEL UCM TO INFORMATICA MDM HUB

The Project Management Plan will be used to guide, communicate and coordinate project efforts.

How To Audit Cloud Computing

A Model for Training/Qualification Record Validation within the Talent Management System

HOW SECURE IS YOUR PAYMENT CARD DATA?

How To Get A Tech Startup To Comply With Regulations

Capability Maturity Model Integration (CMMI SM ) Fundamentals

Advanced Topics for TOGAF Integrated Management Framework

From Chaos to Clarity: Embedding Security into the SDLC

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

CFPB Readiness Series: Compliant Vendor Management Overview

Designing a Data Governance Framework to Enable and Influence IQ Strategy

UC4 Software: HELPING IT ACHEIVE SARBANES-OXLEY COMPLIANCE

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Certified Information Security Manager (CISM)

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Solution Briefing. Integrating the LogLogic API with NSN s Remediation & Escalation Mgmt. System

Appendix 2-A. Application and System Development Requirements

Feature. A Higher Level of Governance Monitoring IT Internal Controls. Controls tend to degrade over time and between audits.

One solution for all your Source Configuration Management Needs

Project Management Plan for

Certified Information Systems Auditor (CISA)

Incident Handling in the Cloud and Audit s Role

NEC Managed Security Services

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.

Managing Special Authorities. for PCI Compliance. on the. System i

JD EDWARDS METHODOLOGY

Going ITIL with Countersoft Gemini

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Presented By: Leah R. Smith, PMP. Ju ly, 2 011

Asset and Lifecycle Management

Overview. The Knowledge Refinery Provides Multiple Benefits:

44-76 mix 2. Exam Code:MB Exam Name: Managing Microsoft Dynamics Implementations Exam

Documenting Distribution Operations: FDA Validation Beyond the Laboratory and Manufacturing Facility

Technology Risk Management Are you ready?

MUSC Information Security Policy Compliance Checklist for System Owners Instructions

Software as a Service: Guiding Principles

Better Business Through Data Analysis & Monitoring

Transcription:

Why SDLC Controls are important for a project Jason D. Lannen CISA, CISM August 21, 2013 11:15 AM

Jason D. Lannen CISA, CISM Founder and Managing Director at TurnKey IT Solutions LLC (established in 2009) More than nine years of IT audit and regulatory compliance experience Managing and executing external and internal audits Executing testing for CPA firms (SOC 1 / SOC 2) Advising companies in security and compliance COBIT 5 Peer Reviewer Managing pre-implementation SDLC controls

Opening Quote At his best, man is the noblest of all animals; separated from law and justice he is the worst. ~ Aristotle

Why are SDLC Controls Important?

Humans need laws and rules 4 We long for consistency and routine We need structure for things that are not structured We long for change

Organization s have to properly manage their risk Reputational Financial Operational Personnel Information Security IT Legal & Regulatory Compliance

Why are SDLC controls important? Establish a framework for building, implementing and enhancing systems that all personnel have to follow

Why are SDLC controls important? Create accountability for IT and business management by requiring documentation and signoffs

Why are SDLC controls important Regulatory Compliance SOX SOC 1 / SOC 2 Gov t Regulation

Why Do Projects Fail?

Why Do Projects Fail?

Why Do Projects Fail? 3 Requirements: Unclear, lack of agreement, lack of priority, contradictory, ambiguous, imprecise. Resources: Lack of resources, resource conflicts, turnover of key resources, poor planning. Schedules: Too tight, unrealistic, overly optimistic. Planning: Based on insufficient data, missing items, insufficient details, poor estimates. Risks: Unidentified or assumed, not managed. POOR COMMUNICATION!

Why Do Projects Fail? 3 The most common obstacles that interfere with recovering failed projects are: Getting stakeholders to accept the changes required Poor communication and stakeholder engagement Conflicting priorities and politics Finding enough qualified resources needed to complete the projects. Lack of a process or methodology to help bring the project back on track

What are Key s to Project Success?

Keys to Project Success 1 Top management support A sound methodology Solid project leadership IT Project Management Office Tactical IT Management Business Management

COBIT 5 2

Key SDLC Phases

Initiation Definition Design & Build Test Implement Key SDLC Phases Inputs Inputs Inputs Inputs Inputs Identify Problem and End Solution SDLC Framework Used Budget Outputs Project Milestones & Dates Initial Project Plan Establish Project Charter Business Req s Functional Req s Technical Req s Outputs Gap Analysis Business / Functional / Technical Req Documentation Traceability Matrix Customize, Code and Configure System Develop user interface Unit Testing Outputs Develop Test Cases & Test Scripts Signoff to test Unit Testing System Integration Testing Regression Testing User Acceptance Testing Outputs Signoff to begin deployment activities Deployment Plan Countdown activities Final Signoffs by Business Management Outputs Go Live! Post Implementation Support Signoff to move to definition Signoff to design and build Change Management Security & Documentation Repositories Issue Tracking Data / Interface / Reports Validation Configuration Mgmt and Controls Development

Change Management Establish a formal change management process when business needs change, functionality / processing errors take place, security requirements are added / changed, infrastructure changes, etc

Change Management Should encompass the following documentation attributes: CR # Description of the Change Impact Analysis Testing Signoff by applicable parties Key considerations: Stored in a secured central repository Traceability to change documents & issue logs

Security Logical access should be appropriately controlled for: System administrative functions, configurations and environments Data used for testing SDLC project documentation repositories Physical access should be restricted to Systems used for SDLC development and testing SDLC project documentation

Security Key Considerations Logical and physical access to all SDLC related information and data should be restricted to appropriate personnel on a need to know basis.

Document Repositories Where SDLC project documentation is stored Project Plan, Bus / Functional / Tech Req s Test Plans / Test Scripts Signoffs Should be tightly controlled through physical and logical access measures, especially confidential information

Document Repositories Document repositories should be backed up on a regular schedule Key Considerations: Document retention should follow Legal and Project requirements A process for non-compliance should be established and be enforced.

Issue Tracking Create a central repository of issues and document: Issue ID Description of the Issue Who identified the issue Status Remediation Plan & Date Remediation Results & Date Key Considerations Establish and have an effective issue monitoring team for trending and impact analysis Issues should tie to change requests / test scripts / affected requirements and validation documentation

Configuration Management Establish a pristine environment which other environments can be refreshed from Application Data If different environments with different configurations are used for certain scenarios, this should be clearly documented and be approved by relevant IT and affected business parties, but used sparingly

Configuration Management Key Considerations: Don t just ask if there was a separation of environments for SDLC, understand what was different between the environments and how management obtained comfort over the activities performed within them. There should be strong security controls in place for who knows user accounts and passwords in dev / test environments and repercussions for those who break security and change management policy

Data, Interfaces and Reports Data Conversion / Data Validation Data Conversion strategy Conversion team completeness and accuracy check Error handling and resolution Data Validation Process of validation Sampling / Visual Review Mass Data Validation Error handling and Resolution

Data Interfaces and Reports Interfaces & Reports Was real or fake data used Were the interfaces tested for functionality or transactability Was validation over completeness and accuracy performed

Controls Development Understand the business processes (old / new) Map controls to business and system requirements and testing performed Work with management to determine the key financial / operational controls. Importance should be stressed on the regulatory compliance aspects and impact to business operations Risk assess controls

Top 10 Ways to Guarantee the Failure of a Project 1 Top 10 Ways to Guarantee the Failure of a Project 10. Don t use a specific methodology because coding is all that is really important. 9. Create the project plan by working backwards from a drop-dead system completion date. 8. Don t bother with a data model. Just build whatever tables you need. 7. Use a Technical Lead that has never built a similar system. Hiring such talent is too expensive. 6. Hire forty developers to make the coding go faster.

Top 10 Ways to Guarantee the Failure of a Project 1 Top 10 Ways to Guarantee the Failure of a Project 5. Build the system in Java, even though most of the development team still thinks that Java is coffee and you have no intention of ever deploying to the Web. 4. Three months before the system goes live, assign one junior developer to handle the data migration. 3. Skip the testing phase because the project is way behind schedule. 2. Change the system to support critical new requirements discovered during final development. 1. Buy a commercial, off-the-shelf package and customize it a lot.

Questions

Contact Information Jason D. Lannen CISA, CISM Managing Director Phone: 770-680-2650 Email: Jason.Lannen@turnkeyit.net Twitter: @turnkey_it Website: www.turnkeyit.net

References 1 http://www.hks.harvard.edu/mrcbg/ethiopia/publications/top%2010%20reason s%20why%20systems%20projects%20fail.pdf 2 COBIT 5: Enabling Processes, ISACA 2012 3 http://www.zdnet.com/blog/projectfailures/cioanalysis-why-37-percent-of-projects-fail/12565 4 http://vinjones.com/2-reasons-why-we-haverules-1consistency/