Secure Systems Development

Responsible for the secure design, development, and testing of systems and the evaluation of system security throughout the systems development life cycle.

  • T0067: Develop architectures or system components consistent with technical specifications
  • T0084: Employ secure configuration management processes
  • T0122: Implement security designs for new or existing systems
  • T0124: Incorporate cybersecurity vulnerability solutions into system designs (e.g., Cybersecurity Vulnerability Alerts)
  • T0271: Develop cybersecurity designs to meet specific operational needs and environmental factors (e.g., access controls, automated applications, networked operations, high integrity and availability requirements, multilevel security/processing of multiple classification levels, and processing Sensitive Compartmented Information)
  • T1010: Communicate enterprise information technology architecture
  • T1019: Determine special needs of cyber-physical systems
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1022: Review enterprise information technology (IT) goals and objectives
  • T1026: Determine procurement requirements
  • T1027: Integrate organizational goals and objectives into security architecture
  • T1030: Estimate the impact of collateral damage
  • T1041: Determine impact of software configurations
  • T1046: Assess operation performance
  • T1047: Assess operation impact
  • T1072: Determine life cycle support requirements
  • T1075: Implement application cybersecurity policies
  • T1078: Determine effectiveness of system cybersecurity measures
  • T1079: Develop cybersecurity risk profiles
  • T1081: Create product prototypes using working and theoretical models
  • T1084: Identify anomalous network activity
  • T1096: Perform privacy impact assessments (PIAs)
  • T1118: Identify vulnerabilities
  • T1119: Recommend vulnerability remediation strategies
  • T1122: Determine essential system capabilities and business functions
  • T1123: Prioritize essential system capabilities and business functions
  • T1124: Restore essential system capabilities and business functions after catastrophic failure events
  • T1128: Design cybersecurity or cybersecurity-enabled products
  • T1129: Develop cybersecurity or cybersecurity-enabled products
  • T1131: Determine if hardware, operating systems, and software applications adequately address cybersecurity requirements
  • T1132: Design system data backup capabilities
  • T1133: Develop technical and procedural processes for integrity of stored backup data
  • T1134: Develop technical and procedural processes for backup data storage
  • T1138: Create system testing and validation procedures and documentation
  • T1148: Develop systems security design documentation
  • T1149: Develop disaster recovery and continuity of operations plans for systems under development
  • T1150: Test disaster recovery and continuity of operations plans for systems prior to deployment
  • T1160: Develop risk mitigation strategies
  • T1161: Resolve system vulnerabilities
  • T1162: Recommend security changes to systems and system components
  • T1163: Develop cybersecurity countermeasures for systems and applications
  • T1164: Develop risk mitigation strategies for systems and applications
  • T1193: Allocate security functions to components and elements
  • T1194: Remediate technical problems encountered during system testing and implementation
  • T1195: Direct the remediation of technical problems encountered during system testing and implementation
  • T1206: Recommend cybersecurity or cybersecurity-enabled products for use within a system
  • T1269: Conduct risk analysis of applications and systems undergoing major changes
  • T1292: Develop guidelines for implementing developed systems for customers and installation teams
  • T1294: Advise on Risk Management Framework process activities and documentation
  • T1309: Analyze system capabilities and requirements
  • T1312: Conduct test and evaluation activities
  • T1326: Develop system performance predictions for various operating conditions
  • T1363: Plan system security development
  • T1364: Conduct system security development
  • T1365: Document cybersecurity design and development activities
  • T1401: Integrate system development life cycle methodologies into development environment
  • T1454: Design secure interfaces between information systems, physical systems, and embedded technologies
  • T1455: Implement secure interfaces between information systems, physical systems, and embedded technologies
  • T1489: Correlate incident data
  • T1507: Determine user requirements
  • T1508: Plan cybersecurity architecture
  • T1519: Design system security measures
  • T1520: Update system security measures
  • T1522: Determine if systems meet minimum security requirements
  • T1563: Implement system security measures
  • T1583: Determine effectiveness of system implementation and testing processes
  • T1584: Establish minimum security requirements for applications
  • T1585: Determine if applications meet minimum security requirements
  • T1586: Conduct cybersecurity risk assessments
  • T1592: Conduct cybersecurity reviews
  • T1593: Identify cybersecurity gaps in enterprise architecture
  • T1604: Provide cybersecurity advice on implementation plans, standard operating procedures, maintenance documentation, and maintenance training materials
  • T1613: Determine if design components meet system requirements
  • T1614: Determine scalability of system architecture