![Pam for dummies » admin by request Privileged access management for dummies: a character walking into a room of access management tools » admin by request](/wp-content/uploads/2024/02/PAM-for-Dummies-700x700.png)
Solutions
Security in
The SDLC
![Lightsmac » admin by request » admin by request A smoking macbook with a lit orange led apple logo. » admin by request » admin by request](/wp-content/uploads/2023/01/lightsMac.png)
The Development Process
![Devprocessdiagram. Png » admin by request » admin by request A visual explanation of the development process. » admin by request » admin by request](/wp-content/uploads/2022/09/DevProcessDiagram.png)
Overview
Software development at FastTrack Software follows a defined process intended to reduce the risk of project failure through the application of fast, iterative solution delivery, with continual testing throughout.
Methodology
This approach focusses on the benefits of a combination of two software development models, DevOps and Lean, to improve the delivery of both major projects and minor software updates.
Process
The diagram to the left provides an overview of the end-to-end process for software and feature development at FastTrack Software.
![51 » admin by request » admin by request Man in red shirt with glasses on his computer. » admin by request » admin by request](/wp-content/uploads/2023/02/51.png)
Management
There are three key areas of management in our software development process to ensure suitable coding practices are followed throughout, all processes are carried out effectively, the appropriate tests are conducted, and all changes are analyzed for impact prior to implementation.
![Cropped-favicon-512x512px-01png » admin by request » admin by request Orange admin by request circle tick logo. » admin by request » admin by request](/wp-content/uploads/2023/06/cropped-Favicon-512x512px-01-300x300.png)
Security Maintenance
After release, penetration tests are conducted both on endpoints and the system backend, including testing of source code and review of APIs to identify any security vulnerabilities. These tests are conducted annually, with a full report including the scope of the test available to customers in the Trust Center.
Vulnerability scans are conducted regularly using a series of known external scanners to test for security weaknesses in software systems. Results are generated by industry-standard providers Security Scorecard, Intruder, and Pentest-Tools, and others. Vulnerability scan reports are generated annually and are available to the public in the Admin By Request Trust Center.
![41 » admin by request » admin by request A standing man resting his head on his hand while using his laptop. » admin by request » admin by request](/wp-content/uploads/2023/02/41.png)
Vulnerability Mitigation
![Cropped-favicon-512x512px-01png » admin by request » admin by request Orange admin by request circle tick logo. » admin by request » admin by request](/wp-content/uploads/2023/06/cropped-Favicon-512x512px-01.png)