Implementation and Assessment

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
5 hours 58 minutes
Difficulty
Intermediate
CEU/CPE
6
Video Transcription
00:00
welcome back to CyberRays is. Of course, I'm your instructor. Bread roads. Let's jump into the third phase of the system development life cycle. That's implementation and assessment.
00:10
Here's our objectives. We're gonna look at security activities just like we've done in the past. We're gonna talk about linkages, and then we're gonna define what implementation and assessment really is.
00:20
So security activities here, we're going to start from the bottom. You got to complete all of the accreditation activities. And so that's the documentation that gets us from We're building a new system to interim authority to operate to hopefully eventually authority to operate and go into the operations and maintenance phase, which is next.
00:39
The next thing we have to do is we just synchronize the testing
00:42
right. That's super important here. This is where we test a lot of our security controls, Azan isi, and one of the things you get to do is lots of documentation as an ISI. And so you're gonna actually right up and provide the evidence as to whether these security controls meet the male or not.
00:57
And then, of course, it's the integration right. We have to put the system or the controls or the capability or the elements or whatever it is as we're trying to get to that system of interest, you gotta put them into their operating environment and see if it actually works. It doesn't make any sense to try to launch, say, a space rated component
01:15
on a satellite if you've never actually tested it in a vacuum
01:18
environment before. So that's what we do that in this integration piece.
01:23
So here are the linkages. So we've made the decision to go into our implementation and assessment, right? We do a lot of detailed planning to gather the information toe, authorize the informant information system to actually function or work right. One of the things you see a lot in this phase is poems have had personal experience working with a custom built system
01:44
that the US government used.
01:45
Great system did great work, but here's some things we were using some older technologies because that's what worked right. It wasn't that we wanted toe use those technologies specifically. It's just that's what we have, right? That's what the member of the cost schedule scope? Well, guess what? We had some cost issues, so we had to do reuse. They had a bunch of things that we had to do, right?
02:05
But
02:06
because of using older technology, we had a bunch of poems. And those poems were things that we had to show how that we mitigated before we got an interim authority to operate. Well, guess what? Sometimes you create a poem and you do nothing with it. Why? Because there is no mitigation that's gonna help it. And
02:22
the person that's going to authorize the system, that authorizing authority,
02:25
they're going to decide whether they're going to accept that poem. That risk or not. Right? So again, we talked about documentation on the previous light in phase three, where we do this implementations. Last assessment. We do a lot of documentation as it sees.
02:43
So what is implementation Assessment?
02:45
It's the deployment integration of our system. So I like the parachute analogy or you jump out of a plane, you're hurtling towards the earth and you deploy the parachute. Well, guess what? You imagine that That that parachute is your security system and you're gonna deploy it into the environment? Well, boop, it comes open and there it is. It's right there. Hopefully, your rigor
03:05
packed it correctly and you don't go crashing down,
03:07
right implications there, Right? And then the second piece is integration. Obviously, when we talk about security controls, individual security controls, right that are being applied to, say, a larger system and the systems engineering construct right, that integration piece is very important. We're gonna talk specifically about assessment in detail in a minute.
03:24
But I want you to remember that when we talk about implementation assessment, it's deploying the system and then in many cases, integrating that system
03:31
to see whether it works in the environment or not.
03:36
So in this video we talked about security activities in the implementation and assessment phase. We talked about those linkages. You got to know those linkages for the use of content. I'm telling you, it's super important to know those charts.
03:47
Um and then, of course, you have implementation. Assessment is really that deployment and integration off capabilities from a security perspective.
03:54
We'll see you next time
Up Next