Security vs Privacy by Design and SSDLC

Develop your ability to compare security and privacy by design across the secure software development lifecycle (SSDLC), and practise structuring a high-mark exam response.

Organising your thinking

Before writing your response, complete the table below. It will help you identify how privacy by design and security by design apply at each stage of the SSDLC.

You should understand:

  • What privacy and security concerns arise at each phase

  • How they are addressed differently

  • Where trade-offs or overlap might occur

Activity: Mapping privacy by design (PbD) and security by design (SbD) across the secure software development lifecycle (SSDLC)

Stage

PbD issues to address

PbD example(s)

SbyD issues to address

SbyD example(s)

User Requirements

System Design

Development

Testing

Maintenance

Use this table as a scaffold before attempting the extended response.

Practice extended-response question (6 marks)

Question:

Discuss how privacy by design and security by design are applied at different stages of the secure software development lifecycle (SSDLC). In your response, refer to at least two different stages and provide specific examples.

Last updated

Was this helpful?