[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

How to Integrate Security Compliance Requirements with Agile Software Engineering at Scale?

  • Conference paper
  • First Online:
Product-Focused Software Process Improvement (PROFES 2020)

Abstract

Integrating security into agile software development is an open issue for research and practice. Especially in strongly regulated industries, complexity increases not only when scaling agile practices but also when aiming for compliance with security standards. To achieve security compliance in a large-scale agile context, we developed S2C-SAFe: An extension of the Scaled Agile Framework that is compliant to the security standard IEC 62443-4-1 for secure product development.

In this paper, we present the framework and its evaluation by agile and security experts within Siemens’ large-scale project ecosystem. We discuss benefits and limitations as well as challenges from a practitioners’ perspective. Our results indicate that S2C-SAFe contributes to successfully integrating security compliance with lean and agile development in regulated environments. We also hope to raise awareness for the importance and challenges of integrating security in the scope of Continuous Software Engineering.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://dx.doi.org/10.6084/m9.figshare.7149179.

References

  1. Ahola, J., et al.: Handbook of the Secure Agile Software Development Life Cycle. University of Oulu, Finland (2014)

    Google Scholar 

  2. Baca, D., Boldt, M., Carlsson, B., Jacobsson, A.: A novel security-enhanced agile software development process applied in an industrial setting. In: Proceedings of the ARES (2015)

    Google Scholar 

  3. Baca, D., Carlsson, B.: Agile development with security engineering activities. In: Proceedings of the ICSSP, pp. 149–158. ACM (2011)

    Google Scholar 

  4. Baca, D.: Developing Secure Software -in an Agile Process - Doctoral Dissertation. Blekinge Institute of Technology (2012)

    Google Scholar 

  5. Bartsch, S.: Practitioners’ perspectives on security in agile development. In: ARES (2011)

    Google Scholar 

  6. Beck, K., et al.: Manifesto for agile software development (2001)

    Google Scholar 

  7. Beckers, K.: Pattern and Security Requirements - Engineering-Based Establishment of Security Standards. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-16664-3

    Book  Google Scholar 

  8. Bell, L., Brunton-Spall, M., Smith, R., Bird, J.: Agile Application Security. Enabling Security in a Continuous Delivery Pipeline. O’Reilly, Sebastopol (2017)

    Google Scholar 

  9. Beznosov, K., Kruchten, P.: Towards agile security assurance. In: Proceedings of the NSPW. ACM (2004)

    Google Scholar 

  10. Cawley, O., Wang, X., Richardson, I.: Lean/Agile software development methodologies in regulated environments – state of the art. In: Abrahamsson, P., Oza, N. (eds.) LESS 2010. LNBIP, vol. 65, pp. 31–36. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16416-3_4

    Chapter  Google Scholar 

  11. Chóliz, J., Vilas, J., Moreira, J.: Independent security testing on agile software development: a case study in a software company. In: Proceedings of the ARES (2015)

    Google Scholar 

  12. Daennart, S., Moyon, F., Beckers, K.: An assessment model for continuous security compliance in large scale agile environments - exploratory paper. In: CAiSE (2019)

    Google Scholar 

  13. Felderer, M., Pekaric, I.: Research challenges in empowering agile teams with security knowledge based on public and private information sources. In: Proceedings of the SecSe (2017)

    Google Scholar 

  14. Fernández, D.M., Wagner, S.: Naming the pain in requirements engineering: design of a global family of surveys and first results from Germany. In: Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering. ACM (2013)

    Google Scholar 

  15. Fernandez, E.B.: Threat modeling in cyber-physical systems. In: Proceedings of the 14th International Conference on Dependable, Autonomic and Secure Computing (2016)

    Google Scholar 

  16. Fitzgerald, B., Stol, K.J.: Continuous software engineering: a roadmap and agenda. J. Syst. Softw. 1–14 (2015)

    Google Scholar 

  17. Fitzgerald, B., Stol, K.J.: Continuous software engineering: a roadmap and agenda. J. Syst. Softw. 123, 176–189 (2017)

    Article  Google Scholar 

  18. Fitzgerald, B., Stol, K.J., O’Sullivan, R., O’Brien, D.: Scaling agile methods to regulated environments: an industry case study. In: Proceedings of the ICSE. IEEE (2013)

    Google Scholar 

  19. Humphreys, E.: How to measure the effectiveness of information security (2017). https://www.iso.org/news/2016/12/Ref2151.html

  20. IEC: 62443-1-1 Security for Industrial and Automation Control Systems Part 1–1 Models and Concepts. International Electrotechnical Commission, USA, 2014 (2014)

    Google Scholar 

  21. IEC: 62443-4-1 security for industrial automation and control systems Part 4–1 product security development life-cycle requirements (2017)

    Google Scholar 

  22. ISO/IEC: 27034 Information technology - Security techniques - Application security (2011)

    Google Scholar 

  23. ISO/IEC: 27001 IT - Security techniques - Information security management systems (2013)

    Google Scholar 

  24. Leffingwell, D., Yakyma, A., Knaster, R., Jemilo, D., Oren, I.: SAFe Reference Guide. Pearson, London (2017)

    Google Scholar 

  25. McGraw, G., Migues, S., Chess, B.: Building security in maturity model. https://www.bsimm.com/about.html

  26. McHugh, M., McCaffery, F., Fitzgerald, B., Stol, K.-J., Casey, V., Coady, G.: Balancing agility and discipline in a medical device software organisation. In: Woronowicz, T., Rout, T., O’Connor, R.V., Dorling, A. (eds.) SPICE 2013. CCIS, vol. 349, pp. 199–210. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38833-0_18

    Chapter  Google Scholar 

  27. Méndez Fernández, D., et al.: Artefacts in software engineering: what are they after all? ArXiv e-prints (2018)

    Google Scholar 

  28. Moyón, F., Beckers, K., Klepper, S., Lachberger, P., Bruegge, B.: Towards continuous security compliance in agile software development at scale. In: Proceedings of the RCoSE. ACM (2018)

    Google Scholar 

  29. Othmane, L., Jaatun, M., Weippl, E.: Empirical Research for Software Security: Foundations and Experience. CRC (2017)

    Google Scholar 

  30. Shull, F., Singer, J., Sjøberg, D.I.: Guide to Advanced Empirical Software Engineering. Springer, London (2007). https://doi.org/10.1007/978-1-84800-044-5

    Book  Google Scholar 

  31. Siponen, M., Baskerville, R., Kuivalainen, T.: Integrating security into agile development methods. In: Proceedings of the HICSS (2005)

    Google Scholar 

  32. Stephanow, P., Khajehmoogahi, K.: Towards continuous security certification of software-as-a-service applications using web application testing techniques. In: Proceedings of the CAINA (2017)

    Google Scholar 

  33. Technology, S.A.C.: Security by Design with CMMI for Development Version 1.3. CMMI Institute (2013)

    Google Scholar 

  34. Tøndel, I.A., Jaatun, M.G., Cruzes, D.S., Moe, N.B.: Risk centric activities in secure software development in public organisations. IJSSE 8(4), 1–30 (2017)

    Google Scholar 

  35. Turpe, S., Poller, A.: Managing security work in scrum: tensions and challenges. In: Proceedings of the SecSE (2017)

    Google Scholar 

Download references

Acknowledgements

To the practitioners that evaluate this work and to M. Voggenreiter and F. Angermeir for their accurate review.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fabiola Moyón .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Moyón, F., Méndez, D., Beckers, K., Klepper, S. (2020). How to Integrate Security Compliance Requirements with Agile Software Engineering at Scale?. In: Morisio, M., Torchiano, M., Jedlitschka, A. (eds) Product-Focused Software Process Improvement. PROFES 2020. Lecture Notes in Computer Science(), vol 12562. Springer, Cham. https://doi.org/10.1007/978-3-030-64148-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-64148-1_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-64147-4

  • Online ISBN: 978-3-030-64148-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics