Investigating the Current State of Security in Large-Scale Agile Development

被引:7
作者
Naegele, Sascha [1 ]
Watzelt, Jan-Philipp [1 ]
Matthes, Florian [1 ]
机构
[1] Tech Univ Munich, Munich, Germany
来源
AGILE PROCESSES IN SOFTWARE ENGINEERING AND EXTREME PROGRAMMING, XP 2022 | 2022年 / 445卷
关键词
Large-scale agile; Security; Software development; SOFTWARE-DEVELOPMENT;
D O I
10.1007/978-3-031-08169-9_13
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Agile methods have become the established way to successfully handle changing requirements and time-to-market pressure, even in large-scale environments. Simultaneously, security has become an increasingly important concern due to more frequent and impactful incidents, stricter regulations with growing fines, and reputational damages. Despite its importance, research on how to address security in large-scale agile development is scarce. Therefore, this paper provides an empirical investigation on tackling software product security in large-scale agile environments. Based on a literature review and preliminary interviews, we identified four essential categories that impact how to handle security: (i) the structure of the agile program, (ii) security governance, (iii) adaptions of security activities to agile processes, and (iv) tool-support and automation. We conducted semi-structured interviews with nine experts from nine companies in five industries based on these categories. We performed a content-structuring qualitative analysis to reveal recurring patterns of best practices and challenges in those categories and identify differences between organizations. Among the key findings is that the analyzed organizations introduce cross-team security-focused roles collaborating with agile teams and use automation where possible. Moreover, security governance is still driven top-down, which conflicts with team autonomy in agile settings.
引用
收藏
页码:203 / 219
页数:17
相关论文
共 48 条
[1]   Quality Requirements in Large-Scale Distributed Agile Projects - A Systematic Literature Review [J].
Alsaqaf, Wasim ;
Daneva, Maya ;
Wieringa, Roel .
REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2017, 2017, 10153 :219-234
[2]  
Ambler S.W., 2020, CHOOSE YOUR WOW
[3]  
Ambler SW, 2008, LECT NOTES COMPUT SC, V5082, P1
[4]  
[Anonymous], 2022, SCALED AGILE FRAMEWO
[5]  
[Anonymous], 2022, LESS OVERVIEW LARGE
[6]  
Aon PLC, 2019, 2019 GLOB RISK MANG
[7]  
Araujo Barbosa Dayanne, 2015, 2015 6th Brazilian Workshop on Agile Methods (WBMA). Proceedings, P25, DOI 10.1109/WBMA.2015.9
[8]   Software penetration testing [J].
Arkin, B ;
Stender, S ;
McGraw, G .
IEEE SECURITY & PRIVACY, 2005, 3 (01) :84-87
[9]  
Bartsch S., 2011, 2011 Sixth International Conference on Availability, Reliability and Security, P479, DOI 10.1109/ARES.2011.82
[10]  
Beznosov K., 2004, NEW SECURITY PARADIG, P47