SDLC Assessment SOP¶
Sub-procedure for Innovate pillar digital transformation
Overview¶
This sub-procedure defines the approach for assessing an organization's current software development lifecycle (SDLC) practices, identifying security gaps, and developing recommendations for implementing secure development practices. It establishes the foundation for DevSecOps transformation.
Scope¶
Pillar: Innovate (Digital Transformation) Service Area: Secure SDLC Related Services: Security Advisory, Application Security
Prerequisites¶
- Executive sponsorship for SDLC improvement
- Development team engagement confirmed
- Access to development tools and documentation
- Key stakeholder availability (Dev, Ops, Security)
- Current development documentation (if available)
- NDA in place for code/architecture review
Procedure¶
Step 1: SDLC Discovery¶
Objective: Understand current development practices
- Interview Stakeholders:
- Development leads and architects
- Operations/infrastructure team
- Security team (if exists)
- Product/project managers
- Document Current State:
- Development methodology (Agile, Waterfall, hybrid)
- Team structure and responsibilities
- Communication and collaboration tools
- Change management process
- Inventory Development Tools:
- Source control (Git, SVN, etc.)
- CI/CD platforms (Jenkins, GitHub Actions, etc.)
- Issue tracking (Jira, Azure DevOps, etc.)
- Documentation systems
- Development environments
Duration: 2-3 days Owner: DevSecOps Consultant
Step 2: Security Practices Assessment¶
Objective: Evaluate current security integration
- Secure Design Review:
- Threat modeling practices
- Security requirements definition
- Architecture review process
- Third-party component evaluation
- Secure Coding Practices:
- Coding standards and guidelines
- Security training for developers
- Code review process (security focus)
- IDE security plugins
- Security Testing:
- Static analysis (SAST) usage
- Dynamic analysis (DAST) usage
- Software composition analysis (SCA)
- Penetration testing frequency
- Deployment Security:
- Infrastructure as Code security
- Container security practices
- Secrets management
- Configuration management
Duration: 3-5 days Owner: Security Consultant
Step 3: CI/CD Pipeline Analysis¶
Objective: Assess automation and security integration
- Pipeline Architecture Review:
- Build process documentation
- Test automation coverage
- Deployment automation
- Environment management
- Security Gate Analysis:
- Pre-commit hooks (secrets, linting)
- Build-time security scans
- Pre-deployment gates
- Post-deployment validation
- Quality Metrics:
- Build success rates
- Deployment frequency
- Mean time to recovery (MTTR)
- Change failure rate
Duration: 2-3 days Owner: DevSecOps Consultant
Step 4: Maturity Assessment¶
Objective: Score current state against maturity model
Use OWASP SAMM or similar framework:
| Practice Area | Level 1 | Level 2 | Level 3 |
|---|---|---|---|
| Governance | Basic policies | Defined processes | Optimized, measured |
| Design | Ad-hoc review | Threat modeling | Continuous validation |
| Development | Basic coding standards | Security training | Automated enforcement |
| Verification | Manual testing | Automated SAST/DAST | Comprehensive, integrated |
| Operations | Basic monitoring | Incident response | Proactive, automated |
- Score each practice area (1-3)
- Identify maturity gaps
- Benchmark against industry peers
- Define target maturity state
Duration: 2-3 days Owner: Security Consultant
Step 5: Gap Analysis and Recommendations¶
Objective: Develop prioritized improvement roadmap
- Document gaps between current and target state
- Prioritize gaps by:
- Security risk reduction
- Business impact
- Implementation complexity
- Resource requirements
- Develop recommendations:
- Quick wins (0-3 months)
- Medium-term improvements (3-6 months)
- Long-term transformation (6-12 months)
- Estimate resources and budget
- Identify tooling requirements
- Define success metrics
Duration: 2-3 days Owner: DevSecOps Consultant
Step 6: Assessment Report and Presentation¶
Objective: Communicate findings and recommendations
- Compile assessment report:
- Executive summary
- Current state assessment
- Maturity scorecard
- Gap analysis
- Prioritized recommendations
- Implementation roadmap
- Budget estimates
- Create executive presentation
- Present to stakeholders
- Address questions and refine priorities
- Obtain approval for next steps
Duration: 2-3 days Owner: Engagement Lead
Deliverables¶
| Deliverable | Format | Owner |
|---|---|---|
| SDLC Current State Document | Word/PDF | DevSecOps Consultant |
| Tool Inventory | Excel | DevSecOps Consultant |
| SAMM Maturity Scorecard | Excel + visualization | Security Consultant |
| Gap Analysis | Excel | DevSecOps Consultant |
| SDLC Assessment Report | Word/PDF (20-30 pages) | Engagement Lead |
| Recommendations Roadmap | Excel/Project | DevSecOps Consultant |
| Executive Presentation | PowerPoint | Engagement Lead |
Quality Gates¶
- All key stakeholders interviewed
- Development tools and processes documented
- Security practices across SDLC phases assessed
- CI/CD pipeline analyzed
- Maturity scores validated with stakeholders
- Gaps prioritized with risk-based rationale
- Recommendations aligned with business objectives
- Report reviewed by engagement manager
SDLC Security Checkpoints¶
| Phase | Security Activities |
|---|---|
| Requirements | Security requirements, abuse cases, compliance needs |
| Design | Threat modeling, security architecture review |
| Development | Secure coding, code review, SAST |
| Testing | DAST, SCA, penetration testing |
| Deployment | Configuration review, secrets management |
| Operations | Monitoring, incident response, patching |
Related Documents¶
Last Updated: February 2026