U.S. Flag Official website of the Department of Homeland Security

Note: This page is part of the us-cert.gov archive.This document is part of the US-CERT website archive. These documents are no longer updated and may contain outdated information. Links may also no longer function. Please contact info@us-cert.gov if you have any questions about the US-CERT website archive.



Presents articles related to the Management phase of the Software Development Life Cycle.

Title Updated datesort ascending
What Measures Do Vendors Use for Software Assurance? 2013-07-31
Estimating Benefits from Investing in Secure Software Development 2013-07-31
Finding a Vendor You Can Trust in the Global Marketplace 2013-07-02
Maturity of Practice 2013-05-23
How Much Security Is Enough? 2013-05-21
Business Case 2013-05-21
Making the Business Case for Software Assurance 2013-05-21
Models for Assessing the Cost and Value of Software Assurance 2013-05-21
Building a Body of Knowledge for ICT Supply Chain Risk Management 2013-05-16
The Software Assurance Competency Model: A Roadmap to Enhance Individual Professional Capability 2013-05-16
Assessing Security Risk In Legacy Systems 2013-05-14
Security Considerations in Managing COTS Software 2013-05-14
Software Security in Legacy Systems 2013-05-14
Foundations for Software Assurance 2013-05-14
A Common Sense Way to Make the Business Case for Software Assurance 2013-05-14
A Systemic Approach for Assessing Software Supply-Chain Risk 2013-05-14
Framing Security as a Governance and Management Concern: Risks and Opportunities 2013-05-14
Governance and Management References 2013-05-14
Security Is Not Just a Technical Issue 2013-05-13
It’s a Nice Idea but How Do We Get Anyone to Practice It? A Staged Model for Increasing Organizational Capability in Software Assurance 2013-05-13
Source Code Analysis Tools - Business Case 2005-09-28
Back to Top