preview

Agile Development Plan

Decent Essays

1.0 Purpose
The purpose of the policy is to explain web application security using agile software methods for James Greene Web Services. This policy will explore methods which will integrate security into Agile Software Development methods. It will also include a policy that will be put in place to safe guard the code, data and access, while clearly identifying the CIA (confidentiality, integrity and accessibility).
2.0 Scope

This policy will include the web application security methods for James Greene Web Services and our affiliates for continuing our security measures while integrating Agile Software Methodologies. Security methods must be able to adjust the agile software development methods. They should not obstruct to the development …show more content…

Making these plans is an actual way of potential methods when you know what the ending will be. If you are not sure, you must agree it takes multiple times get the results. With Agile methodology agrees there will be change and will accept.

3.1 The CIA triangle
The Confidentiality, Integrity and Availability (CIA) of information security was developed to provide a starting point for evaluating and executing information security regardless of James Green Web Services core systems. There are three areas of this triangle and they include: o Confidentiality - Ensures information system is accessed by only an authorized person. o Integrity – This ensures that the data or information system can be trusted. Having encryptions ensures information is protected. o Availability - Data and information systems are available when required. This ensures the network will be availability.
This triangle is considered the ground level of the information systems. To ensure the security of a well-built system, Information Security Governance along with management and policy must be maintained. There could be …show more content…

o Lack of Security Awareness – As development persists, issues regarding security will need to be discussed and if there isn’t enough knowledge this could possibly become an issue.

There are possible techniques which can provide solutions for securing this method such Scrum Methodologies, Dynamic System Develop Method (DSDM) to name a few.
4.1 What is Scrum Agile Methodologies?

Scrum Agile Methodologies is the most popular of the methodologies. It is an outline that uses fixed sprints. Once a sprints has ended, a scrum team works together with a new one which starts until the projected is finished. The team consists of:
• Product Owner - The individual accountable for the outcomes of the development.
• Scrum Master - The individual accountable for the success of the team along with working with participants who are not on the team.
• The Development Team – A group who has various knowledge and experience with developing the system. o Scrum Practices:
 Grooming
 Sprint Planning
 The Actual Sprint
 Stand

Get Access