How is Security Testing Done in Agile Teams? A Cross-Case Analysis of Four Software Teams

被引:25
作者
Cruzes, Daniela Soares [1 ]
Felderer, Michael [2 ]
Oyetoyan, Tosin Daniel [1 ]
Gander, Matthias [2 ]
Pekaric, Irdin [2 ]
机构
[1] SINTEF Digital, Trondheim, Norway
[2] Univ Innsbruck, Innsbruck, Austria
来源
AGILE PROCESSES IN SOFTWARE ENGINEERING AND EXTREME PROGRAMMING (XP 2017): 18TH INTERNATIONAL CONFERENCE, XP 2017 | 2017年 / 283卷
基金
奥地利科学基金会;
关键词
Security testing; Agile testing; Case study research; TAXONOMY;
D O I
10.1007/978-3-319-57633-6_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security testing can broadly be described as (1) the testing of security requirements that concerns confidentiality, integrity, availability, authentication, authorization, nonrepudiation and (2) the testing of the software to validate how much it can withstand an attack. Agile testing involves immediately integrating changes into the main system, continuously testing all changes and updating test cases to be able to run a regression test at any time to verify that changes have not broken existing functionality. Software companies have a challenge to systematically apply security testing in their processes nowadays. There is a lack of guidelines in practice as well as empirical studies in real-world projects on agile security testing; industry in general needs a more systematic approach to security. The findings of this research are not surprising, but at the same time are alarming. The lack of knowledge on security by agile teams in general, the large dependency on incidental pen-testers, and the ignorance in static testing for security are indicators that security testing is highly under addressed and that more efforts should be addressed to security testing in agile teams.
引用
收藏
页码:201 / 216
页数:16
相关论文
共 31 条
[1]  
[Anonymous], AG DEV US MICR SEC D
[2]   Software penetration testing [J].
Arkin, B ;
Stender, S ;
McGraw, G .
IEEE SECURITY & PRIVACY, 2005, 3 (01) :84-87
[3]   One Technique is Not Enough: A Comparison of Vulnerability Discovery Techniques [J].
Austin, Andrew ;
Williams, Laurie .
2011 FIFTH INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM 2011), 2011, :97-106
[4]   A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting [J].
Baca, Dejan ;
Boldt, Martin ;
Carlsson, Bengt ;
Jacobsson, Andreas .
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, :11-19
[5]  
Beznosov K., 2004, NEW SECURITY PARADIG, P47
[6]   Agile Team Members Perceptions on Non-Functional Testing Influencing Factors from an Empirical Study [J].
Camacho, Cristina Rosa ;
Marczak, Sabrina ;
Cruzes, Daniela S. .
PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, :582-589
[7]   Static analysis for security [J].
Chess, B ;
McGraw, G .
IEEE SECURITY & PRIVACY, 2004, 2 (06) :76-79
[8]   Independent Security Testing on Agile Software Development: a Case Study in a Software Company [J].
Choliz, Jesus ;
Vilas, Julian ;
Moreira, Jose .
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, :522-531
[9]  
Crispin L., 2009, AGILE TESTING PRACTI
[10]   Recommended Steps for Thematic Synthesis in Software Engineering [J].
Cruzes, Daniela S. ;
Dyba, Tore .
2011 FIFTH INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM 2011), 2011, :275-284