官术网_书友最值得收藏!

Spiral

Introduced in the mid-1980s by Dr. Barry Boehm, the Spiral model does a much better job of managing risks through one of its core attributes as a process generator. Through multiple successive iterationsstarting with a firm set of requirementsthe concept of operations (CONOPS) is established, requirements are developed (before Spiral development actually starts), the product is developed, tested, verified/validated, and finally released.

The Spiral methodology was originally created for software. Each iteration in this model:

  • Evaluates or reevaluates what the conditions of project success mean for stakeholders
  • Determines whether alternative approaches are needed to achieve project success
  • Evaluates risks from the selected approach
  • Gains approval from stakeholders

Spiral development offers a balance between the upfront investment in time required during waterfall development, and the speed associated with Agile developments. Programs developed using Spiral models allow an initial set of capabilities to be developed during the first Spiral, with additional capabilities being developed and fielded during subsequent Spirals.

This often requires development teams to support engineering of the next Spiral's capabilities, development of the current Spiral's capabilities, and operation of the previously fielded Spiral's software at the same time. 

Spiral software programs still adhere to many of the waterfall processes such as gate reviews. These reviews are done at least once per Spiral, and include system requirements reviews, preliminary design reviews, and critical design reviews.

As with waterfall programs, documentation plays a critical role in the development process. Requirements specifications, design documents, security plans, and test plans and procedures are all created and updated during the program. 

The Spiral approach still mandates that all high-level requirements are developed and known in advance, and reflected in a CONOPS document. However, this takes place from a development perspective—covering architecture development, implementation, and so on.

The Spiral model can facilitate improving the security design through successive iterations (each producing prototypes, and so on) until a final product is delivered:

Source: Wikimedia  Commons

Verification and validation also play an important role in a Spiral development effort. Just as with waterfall programs, an SRTM should be created that allows security engineers to track security requirements to completion.

A security test plan and procedures document should be created and updated each Spiral, to verify the incorporation of mandatory security requirements. Penetration tests should also be run against each successive Spiral's fielded software.

主站蜘蛛池模板: 定安县| 鄂州市| 开阳县| 会东县| 克拉玛依市| 安庆市| 五指山市| 酒泉市| 曲阳县| 通许县| 科尔| 昌平区| 伊宁县| 常熟市| 汶上县| 出国| 大足县| 新巴尔虎右旗| 浪卡子县| 嘉义县| 苍梧县| 广东省| 承德市| 古田县| 竹北市| 陈巴尔虎旗| 准格尔旗| 裕民县| 林周县| 涞水县| 城口县| 富平县| 金华市| 商南县| 麟游县| 顺平县| 沭阳县| 灵武市| 靖边县| 吉隆县| 马公市|