Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

9.1.1. SDLC Methodologies and Security Integration

💡 First Principle: Every SDLC phase has a corresponding security activity that costs dramatically less than finding the same flaw later. The developer who writes a SQL query without parameterization doesn't know it's a vulnerability; the architect who reviews data flows during design might catch that the query is being built with user input; the threat model explicitly identifies injection as a risk before a line of code is written. Prevention at source is always cheaper than detection and remediation.

Security activities by SDLC phase:
PhasePrimary ActivitySecurity ActivityOutput
RequirementsDefine what the system must doSecurity requirements, privacy requirements, abuse casesSecurity requirements document
DesignArchitect the systemThreat modeling (STRIDE), security architecture review, data flow analysisThreat model; design review findings
ImplementationWrite codeSecure coding standards, code review (manual + SAST), SCACode review findings; clean SAST baseline
TestingVerify functionalityDAST, IAST, security test cases from threat model, fuzz testingSecurity test report
DeploymentRelease to productionConfiguration review, hardening verification, pre-prod pentestDeployment checklist; hardening verification
MaintenanceOperate and supportVulnerability scanning, patch management, ongoing monitoringVulnerability reports; patch records

Threat modeling — the most impactful security activity: Threat modeling during design asks: "What could go wrong with this system, and how could it be attacked?" It produces a structured list of threats that informs security requirements, design decisions, and test cases.

STRIDE threat categories:
ThreatTargetsExampleCountermeasure
SpoofingAuthenticationAttacker impersonates legitimate userStrong authentication; MFA
TamperingIntegrityAttacker modifies data in transit or storageIntegrity controls; signing; MAC
RepudiationNon-repudiationUser denies performing an actionAudit logging; digital signatures
Information DisclosureConfidentialityAttacker reads data they shouldn'tEncryption; access controls; least privilege
Denial of ServiceAvailabilityAttacker exhausts resourcesRate limiting; redundancy; input validation
Elevation of PrivilegeAuthorizationAttacker gains more permissions than intendedLeast privilege; authorization checks; sandboxing
Software development methodologies:
MethodologySecurity Consideration
WaterfallSecurity reviews at phase gates; late-stage changes expensive
Agile/ScrumSecurity stories in backlog; security testing in each sprint; DevSecOps
DevOps/DevSecOpsSecurity automated in CI/CD pipeline; SAST/DAST/SCA on every commit
SpiralRisk-driven; explicit risk analysis at each spiral iteration
DevSecOps security pipeline integration:

⚠️ Exam Trap: "We run DAST in the CI/CD pipeline, so we have DevSecOps." DAST without SAST leaves source code vulnerabilities undetected. SAST without SCA leaves third-party library vulnerabilities undetected. DevSecOps requires security automation at each stage — code analysis, build analysis, runtime testing, and production monitoring — not just one tool in the pipeline.

Reflection Question: A development team delivers code to a security review team at the end of every six-month release cycle. The security team performs a penetration test and returns findings. The development team addresses critical findings before release, but many medium findings are deferred. Describe three specific changes to this security model that would find more vulnerabilities earlier and reduce the cost of remediation, and explain what SDLC phases they belong to.

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications