<s>
Security	O
is	O
most	O
effective	O
if	O
planned	O
and	O
managed	O
throughout	O
every	O
stage	O
of	O
software	B-General_Concept
development	I-General_Concept
life	I-General_Concept
cycle	I-General_Concept
(	O
SDLC	O
)	O
,	O
especially	O
in	O
critical	O
applications	O
or	O
those	O
that	O
process	O
sensitive	O
information	O
.	O
</s>
<s>
The	O
solution	O
to	O
software	B-Application
development	I-Application
security	I-Application
is	O
more	O
than	O
just	O
the	O
technology	B-General_Concept
.	O
</s>
<s>
As	O
technology	B-General_Concept
advances	O
,	O
application	B-Application
environments	I-Application
become	O
more	O
complex	O
and	O
application	O
development	O
security	O
becomes	O
more	O
challenging	O
.	O
</s>
<s>
Applications	O
can	O
contain	O
security	O
vulnerabilities	O
that	O
may	O
be	O
introduced	O
by	O
software	B-General_Concept
engineers	I-General_Concept
either	O
intentionally	O
or	O
carelessly	O
.	O
</s>
<s>
Software	O
,	O
environmental	O
,	O
and	O
hardware	B-Architecture
controls	O
are	O
required	O
although	O
they	O
cannot	O
prevent	O
problems	O
created	O
from	O
poor	O
programming	O
practice	O
.	O
</s>
<s>
Building	O
secure	O
software	O
is	O
not	O
only	O
the	O
responsibility	O
of	O
a	O
software	B-General_Concept
engineer	I-General_Concept
but	O
also	O
the	O
responsibility	O
of	O
the	O
stakeholders	O
which	O
include	O
:	O
management	O
,	O
project	O
managers	O
,	O
business	O
analysts	O
,	O
quality	O
assurance	O
managers	O
,	O
technical	O
architects	O
,	O
security	O
specialists	O
,	O
application	O
owners	O
,	O
and	O
developers	O
.	O
</s>
<s>
All	O
secure	O
systems	O
implement	O
security	O
controls	O
within	O
the	O
software	O
,	O
hardware	B-Architecture
,	O
systems	O
,	O
and	O
networks	O
-	O
each	O
component	O
or	O
process	O
has	O
a	O
layer	O
of	O
isolation	O
to	O
protect	O
an	O
organization	O
's	O
most	O
valuable	O
resource	O
which	O
is	O
its	O
data	O
.	O
</s>
