PRIORITIZING INFORMATION SECURITY: ANALYSIS OF SOFTWARE DEVELOPMENT LIFE CYCLE METHODOLOGIES USING THE NIST CYBERSECURITY FRAMEWORK
Keywords:
information security, cybersecurity, software development life cycle, waterfall, rapid application development model, v-model, spiral model, agile model, national institute of standards andAbstract
Information security has become a critical concern for companies seeking to protect data, customer information, and other sensitive assets. In addition to safeguarding data, software development now faces growing threats from hackers and malicious actors in the IT field. The challenge extends beyond ensuring the final product can withstand attacks—it also involves securing the software throughout the development process. This study drew upon existing research and literature to develop its framework and insights. Sources were obtained from reputable, indexed journals. Studies related to the software development lifecycle and the NIST Cybersecurity Framework were carefully analyzed to inform the research and achieve the study’s final objectives. The study revealed how each Software Development Life Cycle (SDLC) model can incorporate the five phases of the NIST Cybersecurity Framework. During the initiation phase, all models follow a similar process for data gathering and consideration of information, data, and security requirements. The primary difference lies in how each model maintains this information and transfers it to subsequent phases. Based on the study’s findings, it is recommended that future researchers examine other Software Development Life Cycles (SDLCs), such as Iterative Waterfall, Agile Scrum, and emerging models, to explore the integration of information security and its benefits for the development process. Additionally, it is recommended that existing SDLCs incorporate new phases addressing data transition, storage, archival, and disposal to align with the final phase of the NIST framework. These recommendations can help project managers better understand the importance of information security and its advantages in terms of project development and organizational economic efficiency.
Published
Issue
Section
License
Copyright (c) 2025 Ascendens Asia Journal of Multidisciplinary Research Conference Proceedings

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright & Disclaimer
Copyright© 2017
Copyright for the texts which include all issues of Ascendens Asia Journal of Multidisciplinary Research Conference Proceedings are held by the AAMJRCP, except if otherwise noted. The compilation as a whole is Copyright© by AAMJRCP, all rights reserved. Items published by AAMJRCP may be generously shared among individuals; however, they may NOT be republished in any medium without express written consent from the author(s) and advance notification of the AAMJRCP Editorial Board. For permission to reprint articles published in the AAMJRCP, please contact the Editorial Board at publications@ascendensasia.com.
Disclaimer
Facts and opinions published in Ascendens Asia Journal of Multidisciplinary Research Conference Proceedings (AAMJRCP) express solely the opinions of the respective authors. Authors are responsible for their citing of sources and the accuracy of their references and bibliographies. The editors cannot be held responsible for any lack or possible violations of third parties’ rights. Interested parties may also directly contact authors to request for full copies of the journal proceedings.