Preface |
|
xiii | |
|
Chapter 1 Lifecycle Management |
|
|
1 | (22) |
|
|
2 | (12) |
|
Why ICT Companies Need to Change the Way They Do Business |
|
|
2 | (1) |
|
The ICT Industry is Significantly Profitable and Globally Influential |
|
|
3 | (1) |
|
Business Realities versus Due Care |
|
|
4 | (1) |
|
The ICT Lifecycle: A Definition |
|
|
5 | (1) |
|
Implementing Best Practice using a Single Framework |
|
|
6 | (2) |
|
|
8 | (1) |
|
The People Factor: The Role of Disciplined and Properly Motivated Performance |
|
|
9 | (1) |
|
Maintaining a Floor Capability |
|
|
9 | (1) |
|
Strategic Management of the Lifecycle |
|
|
10 | (1) |
|
Aligning the ICT Lifecycle with the Business Purpose |
|
|
11 | (1) |
|
Creating a Systematic Lifecycle Management Process |
|
|
11 | (1) |
|
Making Concrete Arrangements for Lifecycle Management |
|
|
12 | (1) |
|
Implementing a Company-Wide Process |
|
|
12 | (1) |
|
Factoring People into the Plan |
|
|
13 | (1) |
|
Oversight and Day-to-Day Lifecycle Management |
|
|
13 | (1) |
|
Lifecycle Management versus Assurance: A Distinction |
|
|
13 | (1) |
|
Summing up Lifecycle Management |
|
|
14 | (1) |
|
Adopting a Single Standard to Minimize ICT Defects |
|
|
14 | (6) |
|
|
18 | (1) |
|
Summing up the ISO 12207 Standard |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (2) |
|
Chapter 2 The Agreement Processes |
|
|
23 | (26) |
|
System Lifecycle Processes: The Agreement Processes |
|
|
24 | (1) |
|
Establishing the Form of the Standard Lifecycle |
|
|
24 | (1) |
|
|
25 | (12) |
|
Overview of the Acquisition Process |
|
|
26 | (3) |
|
Detail of the Acquisition Process |
|
|
29 | (8) |
|
The Supply Process---The Other Side of the Coin |
|
|
37 | (9) |
|
Overview of the Supply Process |
|
|
37 | (1) |
|
Unique Elements of the Supply Process |
|
|
37 | (1) |
|
Responding to the Customer's Bid Request |
|
|
38 | (1) |
|
Negotiating the Contract from the Supplier Side |
|
|
39 | (2) |
|
|
41 | (1) |
|
|
42 | (1) |
|
Documenting Contract Compliance |
|
|
42 | (1) |
|
Product and Process Assurance |
|
|
42 | (1) |
|
Subcontractor Monitoring and Control |
|
|
43 | (1) |
|
Ensuring the Supply Chain |
|
|
43 | (1) |
|
Verification, Validation, and Testing |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
Chapter 3 Organizational Project-Enabling Processes |
|
|
49 | (20) |
|
Overview of Project-Enabling Processes |
|
|
50 | (1) |
|
Why Are Organizational Processes Important? |
|
|
50 | (1) |
|
Lifecycle Model Management Process (6.2.1) |
|
|
51 | (3) |
|
Lifecycle Model Management Activity 6.2.1.3.1: Process Establishment |
|
|
52 | (1) |
|
Lifecycle Model Management Activity 6.2.1.3.2: Process Assessment |
|
|
53 | (1) |
|
Lifecycle Model Management Activity 6.2.1.3.3: Process Improvement |
|
|
53 | (1) |
|
Infrastructure Management Process (6.2.2) |
|
|
54 | (3) |
|
Infrastructure Management Activity 6.2.2.3.1: Process Implementation |
|
|
56 | (1) |
|
Infrastructure Management Activity 6.2.2.3.2: Establishment of the Infrastructure |
|
|
57 | (1) |
|
Infrastructure Management Activity 6.2.2.3.3: Maintenance of the Infrastructure |
|
|
57 | (1) |
|
Project Portfolio Management Process (6.2.3) |
|
|
57 | (2) |
|
Project Portfolio Management Activity 6.2.3.3.1: Project Initiation |
|
|
58 | (1) |
|
Project Portfolio Management Activity 6.2.3.3.2: Portfolio Evaluation |
|
|
59 | (1) |
|
Project Portfolio Management Activity 6.2.3.3.3: Project Closure |
|
|
59 | (1) |
|
Human Resource Management Process (6.2.4) |
|
|
59 | (3) |
|
Human Resource Management Activity 6.2.4.3.1: Skill Identification |
|
|
61 | (1) |
|
Human Resource Management Activity 6.2.4.3.2: Skill Development |
|
|
61 | (1) |
|
Human Resource Management Activity 6.2.4.3.3: Skill Acquisition and Provision |
|
|
62 | (1) |
|
Human Resource Management Activity 6.2.4.3.4: Knowledge Management |
|
|
62 | (1) |
|
Quality Management (6.2.5) |
|
|
62 | (3) |
|
Quality Management Activity 6.2.5.3.1: Quality Management |
|
|
64 | (1) |
|
Quality Management Activity 6.2.5.3.2: Quality Management Corrective Action |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (2) |
|
Chapter 4 Project Processes |
|
|
69 | (24) |
|
Overview of Project Processes |
|
|
70 | (3) |
|
Defining and Coordinating the Project |
|
|
70 | (1) |
|
Building the Project Team |
|
|
71 | (1) |
|
|
72 | (1) |
|
The Project Processes of ISO 12207-2008 |
|
|
72 | (1) |
|
The Project Planning Process (6.3.1) |
|
|
73 | (2) |
|
|
73 | (1) |
|
|
74 | (1) |
|
Project Authorization and Launch |
|
|
74 | (1) |
|
The Project Assessment and Control Process (6.3.2) |
|
|
75 | (2) |
|
The Project Assessment and Control Activities |
|
|
76 | (1) |
|
The Decision Management Process (6.3.3) |
|
|
77 | (3) |
|
Decision Management Activities |
|
|
78 | (2) |
|
The Risk Management Process (6.3.4) |
|
|
80 | (4) |
|
Risk Management Activities |
|
|
80 | (4) |
|
The Configuration Management Process (6.3.5) |
|
|
84 | (2) |
|
Configuration Management Planning |
|
|
85 | (1) |
|
Configuration Management Execution |
|
|
85 | (1) |
|
The Information Management Process (6.3.6) |
|
|
86 | (2) |
|
Information Management Planning |
|
|
86 | (1) |
|
Information Management Execution |
|
|
87 | (1) |
|
The Measurement Process (6.3.7) |
|
|
88 | (2) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
Chapter 5 Technical Processes |
|
|
93 | (24) |
|
Overview of the Technical Process Group |
|
|
94 | (1) |
|
Development Processes of the Technical Process Group |
|
|
94 | (1) |
|
Stakeholder Requirements Definition |
|
|
95 | (3) |
|
Stakeholder Identification |
|
|
95 | (1) |
|
Stakeholder Requirements Identification |
|
|
96 | (1) |
|
Stakeholder Requirements Evaluation |
|
|
97 | (1) |
|
Stakeholder Requirements Agreement and Recording |
|
|
97 | (1) |
|
System Requirements Analysis |
|
|
98 | (2) |
|
Requirements Specification |
|
|
99 | (1) |
|
|
99 | (1) |
|
The Architectural Design Process |
|
|
100 | (1) |
|
Establishing Architecture |
|
|
100 | (1) |
|
|
101 | (1) |
|
The Implementation Process |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
The Qualification Testing Process |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
The Acceptance Support Process |
|
|
104 | (1) |
|
Product Acceptance Support |
|
|
104 | (1) |
|
Technical Process Group: The ICT Operations Process |
|
|
105 | (3) |
|
Preparation for Operation |
|
|
106 | (1) |
|
Operation Activation and Check-Out |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
Technical Process Group: The ICT Maintenance Process |
|
|
108 | (4) |
|
|
110 | (1) |
|
Problem and Modification Analysis |
|
|
110 | (1) |
|
Implementing Modifications |
|
|
110 | (1) |
|
Maintenance Review and Acceptance |
|
|
111 | (1) |
|
|
111 | (1) |
|
Technical Process Group: Disposal |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
115 | (2) |
|
Chapter 6 Software Implementation Process Group |
|
|
117 | (18) |
|
Overview of Software Implementation Process Group |
|
|
118 | (3) |
|
The Software Implementation Process (7.1.1) |
|
|
121 | (2) |
|
Detail of Software Implementation Process: Software Implementation Strategy |
|
|
122 | (1) |
|
The Software Requirements Analysis Process (7.1.2) |
|
|
123 | (2) |
|
Detail of Software Requirements Analysis Process |
|
|
124 | (1) |
|
The Software Architecture Design Process (7.1.3) |
|
|
125 | (1) |
|
Detail of Software Architecture Design Activity |
|
|
126 | (1) |
|
The Software Detailed Design Process (7.1.4) |
|
|
126 | (3) |
|
Detail of Software Detailed Design Activity |
|
|
127 | (2) |
|
The Software Construction Process (7.1.5) |
|
|
129 | (1) |
|
Detail of Software Construction Activity |
|
|
129 | (1) |
|
The Software Integration Process (7.1.6) |
|
|
130 | (1) |
|
Detail of Software Integration Activity |
|
|
130 | (1) |
|
Software Qualification Testing (7.1.7) s |
|
|
131 | (1) |
|
Detail of Software Qualification Testing |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
Chapter 7 Software Supporting Processes and Software Reuse |
|
|
135 | (34) |
|
Overview of the Software Supporting Process Group |
|
|
136 | (1) |
|
Software Documentation Management |
|
|
136 | (3) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
Software Configuration Management |
|
|
139 | (4) |
|
Who Participates in Configuration Management? |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
The Configuration Management Plan |
|
|
141 | (1) |
|
|
142 | (1) |
|
Configuration Identification |
|
|
142 | (1) |
|
|
142 | (1) |
|
Configuration Status Accounting |
|
|
143 | (1) |
|
|
143 | (1) |
|
Release Management & Delivery |
|
|
143 | (1) |
|
Software Quality Assurance |
|
|
143 | (5) |
|
Organization of SQA Operations |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
Overview of Steps: Software Quality Assurance |
|
|
145 | (2) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
Assurance of Quality Systems |
|
|
148 | (1) |
|
|
148 | (4) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (2) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
154 | (3) |
|
|
156 | (1) |
|
Project Management Reviews |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
157 | (2) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (2) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (4) |
|
|
161 | (2) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (2) |
|
Chapter 8 Standard Process Models for Securing ICT Organizations |
|
|
169 | (24) |
|
Underwriting Trust and Competence in ICT |
|
|
170 | (3) |
|
The Problems that Capability Models Address |
|
|
170 | (1) |
|
Putting Capability into Practice |
|
|
171 | (1) |
|
A Distinction: Why We Need to Build a Standard Infrastructure First |
|
|
172 | (1) |
|
Why Use a Process Capability Model? |
|
|
173 | (1) |
|
The History of Best Practice Models |
|
|
173 | (2) |
|
Early Models of the CMM and ISO 9000 |
|
|
173 | (1) |
|
Expanding the Application of the CMM During the Late 1990s |
|
|
174 | (1) |
|
ISO 15408: The Common Criteria |
|
|
174 | (1) |
|
|
174 | (1) |
|
Families of Prominent Capability Models |
|
|
174 | (1) |
|
The Capability Maturity Model (CMM) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (13) |
|
Maturity Levels of the CMM |
|
|
177 | (2) |
|
|
179 | (3) |
|
|
182 | (1) |
|
|
182 | (1) |
|
Determining Capability: The CMM Assessment Process |
|
|
183 | (3) |
|
|
186 | (2) |
|
ISO 15504 (also known as the Security Engineering CMM) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
191 | (2) |
|
Chapter 9 The Systems Security Engineering Capability Maturity Model (ISO 21827) |
|
|
193 | (20) |
|
|
194 | (3) |
|
Background: The SSE-CMM Collaboration |
|
|
196 | (1) |
|
Structure of the SSE-CMM/ISO 21827 Standard |
|
|
197 | (1) |
|
The Base Practices of the SSE-CMM |
|
|
198 | (5) |
|
Project and Organizational Base Practices |
|
|
201 | (2) |
|
Assuring an Organization's System Security Engineering Capability |
|
|
203 | (2) |
|
Architectural Components of the SSE-CMM |
|
|
205 | (5) |
|
Process Capability Assessment |
|
|
205 | (2) |
|
Process Capability Evaluations |
|
|
207 | (1) |
|
Determining Capability Using the SSE-CMM Assessment Model |
|
|
208 | (1) |
|
The SSE-CMM Assessment Process |
|
|
209 | (1) |
|
Using Targeted Assessments to Ensure Supplier Capability |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (2) |
|
Chapter 10 Software Assurance Maturity Model |
|
|
213 | (18) |
|
Overview of the Software Assurance Maturity Model |
|
|
214 | (2) |
|
Understanding the SAMM Framework |
|
|
214 | (2) |
|
Governance Business Function |
|
|
216 | (3) |
|
Strategy & Metrics Practice |
|
|
217 | (1) |
|
Policy & Compliance Practice |
|
|
218 | (1) |
|
Education & Guidance Practice |
|
|
218 | (1) |
|
Construction Business Function |
|
|
219 | (1) |
|
Threat Assessment Practice |
|
|
219 | (1) |
|
Security Requirements Practice |
|
|
220 | (1) |
|
Secure Architecture Practice |
|
|
220 | (1) |
|
Verification Business Function |
|
|
220 | (2) |
|
|
221 | (1) |
|
|
222 | (1) |
|
Security Testing Practice |
|
|
222 | (1) |
|
Deployment Business Function |
|
|
222 | (2) |
|
Vulnerability Management Practice |
|
|
223 | (1) |
|
Environment Hardening Practice |
|
|
223 | (1) |
|
Operational Enablement Practice |
|
|
224 | (1) |
|
Applying SAMM---Getting the Job Done |
|
|
224 | (3) |
|
Understanding the Maturity Levels |
|
|
224 | (1) |
|
SAMM Approach to Assessment |
|
|
225 | (2) |
|
Using Scorecards to Measure Success |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
229 | (2) |
|
Chapter 11 The Building Security In Maturity Model (BSIMM) |
|
|
231 | (16) |
|
|
232 | (5) |
|
|
232 | (2) |
|
|
234 | (3) |
|
|
237 | (1) |
|
Strategy & Metrics Practice |
|
|
237 | (1) |
|
Compliance & Policy Practice |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
Security Features and Design Practice |
|
|
239 | (1) |
|
Standards and Requirements Practice |
|
|
239 | (1) |
|
|
239 | (2) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (3) |
|
|
242 | (1) |
|
|
242 | (1) |
|
Configuration Management and Vulnerability Management |
|
|
243 | (1) |
|
|
244 | (0) |
|
|
244 | (1) |
|
|
245 | (0) |
|
|
245 | (1) |
|
|
246 | (0) |
|
|
246 | (1) |
|
Chapter 12 Aligning the ICT Organization with Regulatory Requirements |
|
|
247 | (16) |
|
Overview of Regulatory Models for ICT Organizations |
|
|
248 | (3) |
|
The Federal Information Security Act of 2002 |
|
|
248 | (3) |
|
NIST 800-53 and General Implementation for FIPS 200 |
|
|
251 | (9) |
|
Generic Security Controls |
|
|
251 | (1) |
|
NIST 800-53 Catalog of Baseline Controls |
|
|
252 | (0) |
|
Organizational Risk Management and NIST 800-53 |
|
|
252 | (1) |
|
Practical Security Control Architectures |
|
|
253 | (2) |
|
Real-World Control Formulation and Implementation |
|
|
255 | (1) |
|
NIST 800-53 Control Baselines |
|
|
256 | (2) |
|
Six Feasibility Considerations for NIST 800-53 |
|
|
258 | (0) |
|
Compensating Security Controls |
|
|
258 | (2) |
|
|
260 | (0) |
|
|
260 | (0) |
|
|
260 | (1) |
|
|
261 | (2) |
|
APPENDIX A GPS/CDU Project for Wild Blue Yonder Technologies |
|
|
263 | (8) |
|
|
263 | (2) |
|
|
264 | (1) |
|
|
265 | (0) |
|
Data Collection, Metrics, and Tracking |
|
|
265 | (0) |
|
Structuring the Organization |
|
|
265 | (2) |
|
|
266 | (1) |
|
Specifics of the GPS/CDU Project |
|
|
267 | (4) |
|
|
268 | (1) |
|
|
269 | (1) |
|
Additional Considerations |
|
|
270 | (1) |
Glossary |
|
271 | (4) |
Index |
|
275 | |