Security Requirements Engineering in the Agile Era: How Does it Work in Practice?

2018 IEEE 1st International Workshop on Quality Requirements in Agile Projects (QuaRAP)(2018)

引用 11|浏览10
暂无评分
摘要
Currently many software companies attempt the integration of agile project delivery models and security requirements engineering (RE). However, very little is published on how this is achieved in real-life settings. This paper reports on results from a documentary study initiated to understand the agile-ready security practices that organizations use. We selected seven well-documented Security RE frameworks for Agile projects that have been used in practice and carried out a qualitative thematic analysis based on documents describing the frameworks and their supposed use in detail. This resulted in a list of solution practices that focus on introducing artefacts, organizational roles, competencies and activities in order to make sure that security RE is done systematically in agile project organizations. Our conclusion is that Security RE adds up to the documentation in an agile project, as teams introduce new story types, e.g. evil user stories, abuser stories, security stories. Plus, we found that Security RE relies on investments into the security training of the agile project teams and into organizing hack sessions. Last, if companies take security requirements seriously, it seems that they should consider ignoring the gatekeeping role of the agile product owner.
更多
查看译文
关键词
agile product owner,security requirements engineering,software companies,agile project delivery models,agile-ready security practices,qualitative thematic analysis,agile project organizations,documentation,security stories,documented security RE frameworks,organizational roles,artefacts,evil user stories,abuser stories,hack sessions,gatekeeping role
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要