software development methodologies

Software vulnerabilities rarely exist in isolation. They are usually the direct result of how software was designed, built, tested, and released. That is why CISSP Domain 8 places strong emphasis on software development methodologies—not to turn security professionals into project managers, but to ensure we understand where security risks emerge and how they can be mitigated.

In real enterprise environments, security teams do not choose the development methodology—but they must operate effectively within it. A security control that works well in a Waterfall environment may completely fail in an Agile or DevOps pipeline.

CISSP Domain 8 expects you to understand:

  • How each methodology works
  • Where security fits (or is often missed)
  • The strengths and weaknesses of each model from a risk perspective

Agile Software Development

Agile is not a single methodology—it is an umbrella term that includes Scrum, XP, Kanban, and other iterative approaches. What defines Agile is its non-linear, incremental nature, where development and testing occur continuously.

Key Agile Characteristics

  • Short development cycles (sprints)
  • Continuous testing and integration
  • Rapid feedback loops
  • Frequent releases
  • Flexibility over rigid documentation

From a security standpoint, Agile fundamentally changes how risk is managed. Security cannot wait for a “final testing phase” because there isn’t one.

Real-World Security Insight

In Agile environments, security teams that insist on heavyweight approvals often get bypassed. Successful organisations embed security directly into sprint planning, backlog grooming, and definition-of-done criteria. This is where DevSecOps naturally evolves.


Waterfall Model

The Waterfall model is the oldest and most traditional SDLC methodology. It follows a rigid, sequential approach where each phase must be completed before moving to the next.

Waterfall Phases

  1. Requirements
  2. Design
  3. Implementation
  4. Verification
  5. Maintenance

Waterfall is easy to manage and document, which is why it still appears in regulated industries such as government, healthcare, and defence.

Security Strengths and Weaknesses

  • Strength: Security requirements can be clearly defined upfront
  • Weakness: Security flaws discovered late are extremely expensive to fix

From experience, Waterfall often gives management a false sense of security because “everything was signed off,” even when threat models were outdated before coding began.


V-Model (Verification and Validation Model)

The V-Model is an extension of Waterfall that explicitly maps testing activities to each development phase. For every development stage, there is a corresponding validation phase.

Why Security Teams Like the V-Model

  • Testing is not optional
  • Security verification is planned, not reactive
  • Strong alignment with compliance and audit requirements

Why It Struggles in Modern Environments

The V-Model is inflexible. Once requirements are locked, adapting to new threats—such as zero-day vulnerabilities—becomes extremely difficult.

CISSP candidates should recognise the V-Model as thorough but slow, making it suitable for high-assurance systems but poorly suited to fast-moving threat landscapes.


Spiral Software Development Model

The Spiral model is designed for risk-driven development, making it one of the most security-aware methodologies in Domain 8.

Each loop of the spiral includes:

  • Planning
  • Risk analysis
  • Engineering
  • Evaluation

Security Perspective

Unlike most models, Spiral explicitly identifies and mitigates risks at every iteration. This makes it particularly valuable for:

  • Large enterprise systems
  • Safety-critical software
  • Systems handling sensitive data

In practice, Spiral is often combined with Agile techniques to manage both risk and speed.


DevOps (and DevSecOps)

DevOps combines development and operations into a single continuous delivery pipeline. It focuses on automation, collaboration, and rapid deployment.

Why DevOps Changes Security Forever

Traditional security gates simply do not work in DevOps. When deployments happen multiple times per day, security must be:

  • Automated
  • Embedded
  • Continuous

Security in DevOps

  • Infrastructure as Code (IaC) scanning
  • Automated security testing
  • Continuous vulnerability monitoring
  • Secure CI/CD pipelines

In mature organisations, DevOps naturally evolves into DevSecOps, where security becomes a shared responsibility—not a bottleneck.


Scrum Methodology

Scrum is one of the most widely used Agile frameworks. It organises work into time-boxed sprints, supported by regular ceremonies such as daily stand-ups and sprint reviews.

Why Scrum Matters in CISSP

Scrum highlights the importance of:

  • Continuous stakeholder feedback
  • Incremental delivery
  • Rapid response to change

From a security perspective, Scrum environments require ongoing risk assessment, not annual security reviews.


Lean Software Development

Lean development originates from Toyota’s manufacturing principles and focuses on maximising value while eliminating waste.

Lean Principles Relevant to Security

  • Eliminate unnecessary controls
  • Focus on high-impact risks
  • Build quality in from the start
  • Empower teams

Security professionals often find Lean challenging because it discourages heavy documentation. However, when done correctly, Lean can significantly reduce attack surface by removing unused features and complexity.


Prototype Model

The Prototype methodology involves building an early working model of the system to gather feedback before full development.

Security Considerations

Prototypes are often built quickly—and insecurely. A common real-world mistake is allowing prototype code to enter production unchanged, introducing serious vulnerabilities.

CISSP expects you to recognise that prototypes must be:

  • Clearly labelled
  • Properly secured
  • Re-engineered before production use

Rapid Application Development (RAD)

RAD prioritises speed and user feedback over formal planning.

RAD Security Risks

  • Reduced documentation
  • Inconsistent security controls
  • Increased reliance on third-party components

RAD can be effective for internal tools, but CISSP candidates should recognise that security debt accumulates quickly if governance is weak.


Feature-Driven Development (FDD)

FDD is an iterative, model-driven methodology designed for large teams.

FDD Phases

  1. Develop overall model
  2. Build feature list
  3. Plan by feature
  4. Design by feature
  5. Build by feature

FDD provides strong progress visibility, which is valuable for security tracking and risk reporting.


Extreme Programming (XP)

Extreme Programming emphasises:

  • Frequent releases
  • Continuous testing
  • Pair programming
  • Constant customer feedback

Security Advantages

  • Issues are identified early
  • Code quality improves through collaboration
  • Security flaws surface faster

XP aligns well with secure coding practices, but only if developers are trained in security fundamentals.


Choosing the “Right” Methodology from a Security View

There is no universally “secure” methodology. Security success depends on:

  • Organisational maturity
  • Threat landscape
  • Regulatory requirements
  • Team skill levels

CISSP Domain 8 tests your ability to evaluate trade-offs, not memorise definitions.


Final Thoughts: Why This Matters for CISSP and Beyond

In real-world breaches, post-incident reviews often reveal that:

  • Security was added too late
  • Risks were misunderstood
  • Methodology constraints were ignored

Understanding software development methodologies allows security professionals to influence decisions early, where security is cheapest and most effective.

CISSP Domain 8 is not about software theory—it’s about preventing the next breach before the first line of code is written.

Leave a Reply

Your email address will not be published. Required fields are marked *