← Back to Domain 8
📋 SDLC Phase Ordering
ISC2 CBK 7-phase model · V&V vs Accreditation · CISSP drill

Drag each SDLC phase card into the correct numbered slot (ISC2 CBK 7-phase model).

1Drop here
Phase 1
2Drop here
Phase 2
3Drop here
Phase 3
4Drop here
Phase 4
5Drop here
Phase 5
6Drop here
Phase 6
7Drop here
Phase 7
Verification

Are we building it right?

Checks that the software conforms to its specifications and design documents at each phase. Internal, process-focused. Example: code review, design walkthroughs, unit tests against spec.

Validation

Are we building the right thing?

Confirms the finished product meets the user's actual needs and intended use. External, outcome-focused. Example: acceptance testing, user acceptance testing (UAT), operational testing.

Accreditation

Management accepts the risk

Formal management decision to accept residual risk and authorize a system to operate. In U.S. federal/DoD: Authority to Operate (ATO). Done by the Authorizing Official (AO). Time-limited, risk-based.

Certification

Technical security assessment

Comprehensive technical evaluation of security controls to determine if they meet requirements. Precedes accreditation. Produces the Security Assessment Report (SAR) used by the AO.

Concept Question answered Who owns it SDLC phase CISSP domain
VerificationBuilt to spec?Developers / QADevelopment & TestingDomain 8 (SDLC)
ValidationMeets user need?Users / QA / PMTesting & AcceptanceDomain 8 (SDLC)
CertificationControls adequate?Security assessor (3rd party or internal)Operations & MaintenanceDomain 3 (Security Arch)
Accreditation / ATORisk acceptable to operate?Authorizing Official (AO/DAA)Operations & MaintenanceDomain 1 (Risk Mgmt)