A software development organization wants to integrate security into its agile development process. Which of the following approaches would be MOST effective?
Implementing security controls after the application is feature-complete
Conducting a comprehensive security review at the end of each release
Adding security-focused user stories and acceptance criteria to the product backlog
Requiring developers to complete security training once per year
The correct answer is Adding security-focused user stories and acceptance criteria to the product backlog. Integrating security-focused user stories and acceptance criteria into the product backlog ensures that security requirements are treated with the same priority as functional requirements and are addressed during regular development sprints. This approach aligns with agile principles by making security work visible, trackable, and part of the regular development workflow rather than a separate activity.
Conducting a comprehensive security review at the end of each release is incorrect because conducting security reviews only at the end of each release contradicts agile principles by creating a "mini-waterfall" approach. This creates a bottleneck at the end of the release cycle and often leads to security issues being deferred to future releases when time constraints arise.
Requiring developers to complete security training once per year is incorrect because while security training is important, annual training alone is insufficient for integrating security into an agile process. Effective integration requires ongoing application of security practices throughout development, not just periodic training.
Implementing security controls after the application is feature-complete is incorrect because implementing security controls only after the application is feature-complete represents a traditional waterfall approach that contradicts agile principles. This approach often leads to significant rework or security compromises when security requirements conflict with established functionality.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are security-focused user stories and why are they important?
Open an interactive chat with Bash
How can security awareness among developers be effectively increased?
Open an interactive chat with Bash
What are agile principles and how do they affect security integration?
Open an interactive chat with Bash
ISC2 CISSP
Software Development Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access