METHOD OF INTEGRATION OF CYBERSECURITY REQUIREMENTS INTO THE SOFTWARE DEVELOPMENT LIFECYCLE

Authors

DOI:

https://doi.org/10.28925/2663-4023.2026.32.1184

Keywords:

cybersecurity; software development life cycle; SDLC; DevSecOps; threat modeling; security; cybersecurity requirements.

Abstract

In modern conditions, it is important not only to develop software to protect information systems and data, but also to integrate security functions (cybersecurity) into the phases of the software development life cycle. In view of this, the work formalized in a general form the well-known models of the software development life cycle and formed a unified SDLC model. Also, a method for integrating cybersecurity requirements into the SDLC was developed, which allows integrating cybersecurity requirements into a specific phase (pipeline) of the software development life cycle in accordance with the DevSecOps model, and also allows for formal optimization of the choice of cybersecurity controls depending on the system context and resource constraints. The results obtained can be used for the systematic integration of cybersecurity requirements (according to regulatory documents ISO/IEC, NIST, PCI DSS, PSD2, GDPR, MITRE ATT&CK) into software development processes in organizations that create or operate critical infrastructure information systems, cloud services, and corporate information and communication systems.

Downloads

Download data is not yet available.

References

Moiseienko, V. M., & Antonenko, S. V. (2025). Research on the use of AI in the software development lifecycle. Actual Problems of Automation and Information Technologies, 29, 293–305.

Delembovskyi, M., Markevych, M., & Korniichuk, B. (2024). Review of cybersecurity audit methodologies for compliance with standards. Pidvodni Tekhnolohii, 1(14), 71–74. https://doi.org/10.32347/uwt.2024.14.1206

Zhuravchak, A., & Piskozub, A. (2025). Analysis of machine learning methods for automating penetration testing. Cybersecurity: Education, Science, Technique, 3(27), 54–62. https://doi.org/10.28925/2663-4023.2025.27.711

Saini, J., & Bansal, A. (2024). Automated penetration testing: Machine learning approach. In Symposium on Computing Intelligent Systems (SCI) (Vol. 3682, pp. 113–125).

Foros, A. V. (2009). Information security as a component of national security of Ukraine. Pravova Derzhava, 11, 222–226.

Khari, M., Vaishali, & Kumar, P. (2016). Embedding security in software development lifecycle (SDLC). In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 2182–2186).

IT Notes. (n.d.). Software development lifecycle (SDLC). https://www.it-notes.wiki/other/software-development-lifecycle

Manjeti, V., Penumajji, S., Patlolla, S., et al. (2025). Enhancing security in SDLC with DevOps tools and practices. In 2025 International Conference on Next Generation of Green Information and Emerging Technologies (GIET) (pp. 1–5). https://doi.org/10.1109/GIET65294.2025.11234805

Bhardwaj, A., Anugula, P., et al. (2025). Zero trust CI/CD pipeline: A blueprint for secure software delivery in modern DevSecOps. In 2025 IEEE Uttar Pradesh Section WIE International Conference (pp. 233–237). https://doi.org/10.1109/UPWIECON67212.2025.11390387

International Organization for Standardization. (2022). ISO/IEC 27001:2022—Information security management systems—Requirements.

National Institute of Standards and Technology. (2020). Security and privacy controls for information systems and organizations (NIST SP 800-53 Rev. 5). https://doi.org/10.6028/NIST.SP.800-53r5

Hancock, S. (2025). PCI DSS version 4.0.1: A guide to the payment card industry data security standard. Packt Publishing.

Wodo, W., & Stygar, D. (2021). PSD2-compliant hardware token for digital banking. In 62nd International Scientific Conference on Information Technology and Management Science (ITMS) (pp. 1–6).

IT Governance Privacy Team. (2025). EU General Data Protection Regulation (GDPR): An implementation and compliance guide. Packt Publishing.

Tsai, W., Luo, J.-N., & Chou, C.-L. (2025). Integrating tree structures with the MITRE ATT&CK framework for APT detection. In 2025 9th International Conference on Cryptography, Security and Privacy (CSP) (pp. 139–143). https://doi.org/10.1109/CSP66295.2025.00031

TechnologyAdvice. (n.d.). What is waterfall project management? https://technologyadvice.com/blog/project-management/what-is-waterfall-project-management

Teaching Agile. (n.d.). V-model in software development. https://teachingagile.com/sdlc/models/v-model

Guru99. (n.d.). Incremental model in SDLC. https://www.guru99.com/what-is-incremental-model-in-sdlc-advantages-disadvantages.html

Teaching Agile. (n.d.). Spiral model. https://teachingagile.com/sdlc/models/spiral

InterviewBit. (n.d.). Agile model. https://www.interviewbit.com/blog/agile-model

BETSOL. (n.d.). What is DevOps? https://www.betsol.com/blog/what-is-devops

Skurativskyi, A. (2025). Method for managing cybersecurity requirements in software implementation in business. Information Security, 3, 145–162.

Seol, J., Deuja, J., et al. (2025). A quantitative study across the CIA triad and performance in blockchain-based crypto-space. In 2025 7th International Conference on Blockchain Computing and Applications (BCCA) (pp. 161–168). https://doi.org/10.1109/BCCA66705.2025.11229817

Kharchenko, V., Korchenko, O., & Hnatiuk, S. (2017). Multilevel data model for compliance with cybersecurity regulatory requirements in civil aviation. Information Protection, 19(1), 95–104. https://doi.org/10.18372/2410-7840.19.11499

Raj, G., Singh, D., & Bansal, A. (2014). Analysis for security implementation in SDLC. In 2014 5th International Conference – Confluence (pp. 221-226). https://doi.org/10.1109/CONFLUENCE.2014.6949376

Downloads


Abstract views: 6

Published

2026-03-26

How to Cite

Gnatyuk, S., Poberezhna, Z., & Skurativskyi, A. (2026). METHOD OF INTEGRATION OF CYBERSECURITY REQUIREMENTS INTO THE SOFTWARE DEVELOPMENT LIFECYCLE. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(32), 947–962. https://doi.org/10.28925/2663-4023.2026.32.1184

Most read articles by the same author(s)

1 2 > >>