Enhance your CompTIA CASP+ exam readiness with our comprehensive quizzes. Sharpen your skills with detailed flashcards and multiple choice questions, each with hints and in-depth explanations. Prepare effectively for this challenging exam!

Practice this question and more.


What is the correct order of a five-phase SSDLC?

  1. Planning, execution, delivery, assessment, maintenance

  2. Initiation, acquisition/development, implementation/assessment, operations/maintenance, sunset

  3. Requirement analysis, design, coding, testing, deployment

  4. Policy review, compliance, development, maintenance, phasing out

The correct answer is: Initiation, acquisition/development, implementation/assessment, operations/maintenance, sunset

The five-phase Secure Software Development Life Cycle (SSDLC) is critical for integrating security considerations throughout the software development process. The correct sequence involves specific stages that ensure security is not just a final check but woven into the fabric of the software from the very beginning. Starting with initiation, this phase focuses on defining the project scope, identifying stakeholders, and determining security requirements. Following this, acquisition/development involves the actual design and building processes, ensuring that security measures are implemented as part of software features and functionality. Next is the implementation/assessment phase, where the application is deployed, and security assessments are conducted to identify vulnerabilities and verify that security controls work effectively. The operations/maintenance phase ensures the software continues to meet security standards and that vulnerabilities are addressed throughout the software's lifecycle, considering updates and patches. Lastly, the sunset phase involves phasing out the application securely, ensuring data destruction and user transition processes are followed. This structured approach emphasizes the importance of security at every stage of software development rather than treating it as an afterthought or solely a final testing phase. The other choices do not represent the stages of a Secure Software Development Life Cycle and reflect either traditional models or irrelevant processes that do not cover the comprehensive security-focused approach necessary for effective software development