Skip to main content
Top

2020 | OriginalPaper | Chapter

Adapting Agile Practices to Security Context – Practitioners’ Perspective

Authors : Katarzyna Łukasiewicz, Sara Cygańska

Published in: Advances in Agile and User-Centred Software Engineering

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set of agile security-oriented practices which are a part of the proposed approach. This paper is an extended version of the paper “Security-oriented agile approach with AgileSafe and OWASP ASVS” that was published as a part of LASD 2019 conference proceedings [36].

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Schwaber, K., Beedle, M.: Agile Software Development with Scrum. Prentice Hall, Upper Saddle River (2002)MATH Schwaber, K., Beedle, M.: Agile Software Development with Scrum. Prentice Hall, Upper Saddle River (2002)MATH
3.
go back to reference Beck, K., Andres, C.: Extreme Programming Explained. Addison-Wesley Professional, Boston (2004) Beck, K., Andres, C.: Extreme Programming Explained. Addison-Wesley Professional, Boston (2004)
4.
go back to reference Anderson, D.: Kanban. Blue Hole Press, Sequim (2010) Anderson, D.: Kanban. Blue Hole Press, Sequim (2010)
6.
go back to reference Manico, J.: OWASP Application Security Verification Standard (2015) Manico, J.: OWASP Application Security Verification Standard (2015)
7.
go back to reference Łukasiewicz, K., Górski, J.: AgileSafe – a method of introducing agile practices into safety-critical software development processes. In: Proceedings of the Federated Conference on Computer Science, vol. 8, pp. 1549–1552 (2016) Łukasiewicz, K., Górski, J.: AgileSafe – a method of introducing agile practices into safety-critical software development processes. In: Proceedings of the Federated Conference on Computer Science, vol. 8, pp. 1549–1552 (2016)
9.
go back to reference Drobka, J., Noftz, D., Raghu, R.: Piloting XP on four mission-critical projects. IEEE Softw. 21(6), 70–75 (2004)CrossRef Drobka, J., Noftz, D., Raghu, R.: Piloting XP on four mission-critical projects. IEEE Softw. 21(6), 70–75 (2004)CrossRef
10.
go back to reference Lindvall, M., et al.: Agile software development in large organizations. Computer 37(12), 26–34 (2004)CrossRef Lindvall, M., et al.: Agile software development in large organizations. Computer 37(12), 26–34 (2004)CrossRef
11.
go back to reference Knaster, R., Leffingwell, D.: SAFe Distilled: Applying the Scaled Agile Framework for Lean Software and Systems Engineering. Addison-Wesley Professional, New York (2017) Knaster, R., Leffingwell, D.: SAFe Distilled: Applying the Scaled Agile Framework for Lean Software and Systems Engineering. Addison-Wesley Professional, New York (2017)
12.
go back to reference Kim, G., Willis, J., Debois, P., Humble, J., Allspaw, J.: The DevOps Handbook. Trade Select (2016) Kim, G., Willis, J., Debois, P., Humble, J., Allspaw, J.: The DevOps Handbook. Trade Select (2016)
15.
16.
go back to reference National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity (2014) National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity (2014)
20.
go back to reference Mougouei, J.D., Fazlida, N., Sani, M., Almasi, M.M.: S-Scrum: a secure methodology for agile development of web services. World Comput. Sci. Inf. Technol. J. (WCSIT) 3(1), 15–19 (2013) Mougouei, J.D., Fazlida, N., Sani, M., Almasi, M.M.: S-Scrum: a secure methodology for agile development of web services. World Comput. Sci. Inf. Technol. J. (WCSIT) 3(1), 15–19 (2013)
21.
go back to reference Łukasiewicz, K.: Method of selecting programming practices for the safety-critical software development projects. Ph.D. dissertation, Department of Software Engineering, Gdańsk University of Technology, Gdańsk, Poland (2019) Łukasiewicz, K.: Method of selecting programming practices for the safety-critical software development projects. Ph.D. dissertation, Department of Software Engineering, Gdańsk University of Technology, Gdańsk, Poland (2019)
22.
go back to reference Górski, J., Jarzębowicz, J., Leszczyna, R., Miler, J., Olszewski, M.: Trust case: justifying trust in an IT solution. Reliab. Eng. Syst. Saf. 89(1), 33–47 (2005)CrossRef Górski, J., Jarzębowicz, J., Leszczyna, R., Miler, J., Olszewski, M.: Trust case: justifying trust in an IT solution. Reliab. Eng. Syst. Saf. 89(1), 33–47 (2005)CrossRef
23.
go back to reference Musen, M.A.: The Protégé project: a look back and a look forward. AI Matters 1(4), 4–12 (2015). Association of Computing Machinery Specific Interest Group in Artificial IntelligenceCrossRef Musen, M.A.: The Protégé project: a look back and a look forward. AI Matters 1(4), 4–12 (2015). Association of Computing Machinery Specific Interest Group in Artificial IntelligenceCrossRef
24.
25.
go back to reference IEC 62443-4-1 4-1: Secure product development life-cycle requirements IEC 62443-4-1 4-1: Secure product development life-cycle requirements
26.
go back to reference Peeters, J.: Agile security requirements engineering. In: Symposium on Requirements Engineering for Information Security (2005) Peeters, J.: Agile security requirements engineering. In: Symposium on Requirements Engineering for Information Security (2005)
27.
go back to reference Fischer, E.A.: Federal Laws Relating to Cybersecurity: Overview of Major Issues, Current Laws, and Proposed Legislation (2014) Fischer, E.A.: Federal Laws Relating to Cybersecurity: Overview of Major Issues, Current Laws, and Proposed Legislation (2014)
28.
go back to reference Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Eng. 10(1), 34–44 (2005)CrossRef Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Eng. 10(1), 34–44 (2005)CrossRef
29.
go back to reference Williams, L., Meneely, A., Shipley, G.: Protection poker: the new software security “game”. IEEE Secur. Priv. 3, 14–20 (2010)CrossRef Williams, L., Meneely, A., Shipley, G.: Protection poker: the new software security “game”. IEEE Secur. Priv. 3, 14–20 (2010)CrossRef
31.
go back to reference Boström, G., Wäyrynen, J., Bodén, M., Beznosov, K., Kruchten, P.: Extending XP practices to support security requirements engineering. In: Proceedings of the 2006 International Workshop on Software Engineering for Secure Systems (SESS 2006). ACM, New York, pp. 11–18. http://dx.doi.org/10.1145/1137627.1137631 Boström, G., Wäyrynen, J., Bodén, M., Beznosov, K., Kruchten, P.: Extending XP practices to support security requirements engineering. In: Proceedings of the 2006 International Workshop on Software Engineering for Secure Systems (SESS 2006). ACM, New York, pp. 11–18. http://​dx.​doi.​org/​10.​1145/​1137627.​1137631
34.
go back to reference Pohl, C., Hof, H.-J.: Secure Scrum: development of secure software with scrum. In: Securware 2015: The Ninth International Conference on Emerging Security Information, Systems and Technologies (2015) Pohl, C., Hof, H.-J.: Secure Scrum: development of secure software with scrum. In: Securware 2015: The Ninth International Conference on Emerging Security Information, Systems and Technologies (2015)
36.
go back to reference Łukasiewicz, K., Cygańska, S.: Security-oriented agile approach with AgileSafe and OWASP ASVS. In: Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, Leipzig, Germany (2019) Łukasiewicz, K., Cygańska, S.: Security-oriented agile approach with AgileSafe and OWASP ASVS. In: Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, Leipzig, Germany (2019)
Metadata
Title
Adapting Agile Practices to Security Context – Practitioners’ Perspective
Authors
Katarzyna Łukasiewicz
Sara Cygańska
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-37534-8_4

Premium Partner