Incorporating software security: using developer workshops to engage product managers

被引:0
|
作者
Charles Weir
Ingolf Becker
Lynne Blair
机构
[1] Lancaster University,Computing and Communications
[2] University College London,Security and Crime Science
来源
关键词
Developer centered security; Software security; Software developer; Cybersecurity; Software development; SDLC; Product management; Product manager; Design based research;
D O I
暂无
中图分类号
学科分类号
摘要
Evidence from data breach reports shows that many competent software development teams still do not implement secure, privacy-preserving software, even though techniques to do so are now well-known. A major factor causing this is simply a lack of priority and resources for security, as decided by product managers. So, how can we help developers and product managers to work together to achieve appropriate decisions on security and privacy issues? This paper explores using structured workshops to support teams of developers in engaging product managers with software security and privacy, even in the absence of security professionals. The research used the Design Based Research methodology. This paper describes and justifies our workshop design and implementation, and describes our thematic coding of both participant interviews and workshop discussions to quantify and explore the workshops’ effectiveness. Based on trials in eight organizations, involving 88 developers, we found the workshops effective in helping development teams to identify, promote, and prioritize security issues with product managers. Comparisons between organizations suggested that such workshops are most effective with groups with limited security expertise, and when led by the development team leaders. We also found workshop participants needed minimal guidance to identify security threats, and a wide range of ways to promote possible security improvements. Empowering developers and product managers in this way offers a powerful grassroots approach to improve software security worldwide.
引用
收藏
相关论文
共 50 条
  • [31] INCORPORATING SECURITY CONSIDERATIONS INTO OPTIMAL PRODUCT ARCHITECTURE AND COMPONENT SHARING DECISION IN PRODUCT FAMILY DESIGN
    Arciniegas, Alvaro J. Rojas
    Kim, Harrison M.
    PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, DETC 2010, VOL 5, 2010, : 507 - +
  • [32] Incorporating security considerations into optimal product architecture and component sharing decision in product family design
    Arciniegas, Alvaro J. Rojas
    Kim, Harrison M.
    ENGINEERING OPTIMIZATION, 2012, 44 (01) : 55 - 74
  • [33] Incorporating the Voice of the Customer into Mass-Market Software Product Management
    Naous, Dana
    Giessmann, Andrea
    Legner, Christine
    PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, : 1397 - 1404
  • [34] The possibilities of ensuring the security of the software product in the conditions of unauthorized access
    Dziatkovskii, Anton
    Hryneuski, Uladzimir
    ECONOMIC ANNALS-XXI, 2021, 189 (5-6): : 90 - 100
  • [35] A reference measurement framework of software security product quality (SPQNFSR)
    Al-Sarayreh, Khalid T.
    Alenezi, Mamdouh
    Zarour, Mohammed
    Meridji, Kenza
    IET INFORMATION SECURITY, 2021, 15 (01) : 23 - 37
  • [36] Checking Software Security Using EFSMs
    Ermakov, Anton D.
    Prokopenko, Svetlana A.
    Yevtushenko, Nina V.
    2017 18TH INTERNATIONAL CONFERENCE OF YOUNG SPECIALISTS ON MICRO/NANOTECHNOLOGIES AND ELECTRON DEVICES (EDM), 2017, : 87 - 90
  • [37] Security software using neural networks
    Zimmer, JP
    Miteran, J
    Yang, F
    Paindavoine, M
    IECON '98 - PROCEEDINGS OF THE 24TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-4, 1998, : 72 - 74
  • [38] Incorporating security requirements into communication protocols in multi-agent software systems
    Luo, Yuxiu
    Antoniou, Giannakis
    Sterling, Leon
    EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 159 - 160
  • [39] Using Developer Activity Data to Enhance Awareness during Collaborative Software Development
    Inah Omoronyia
    John Ferguson
    Marc Roper
    Murray Wood
    Computer Supported Cooperative Work (CSCW), 2009, 18
  • [40] Maintaining Requirements for Long-Living Software Systems by Incorporating Security Knowledge
    Gaertner, Stefan
    Ruhroth, Thomas
    Buerger, Jens
    Schneider, Kurt
    Juerjens, Jan
    2014 IEEE 22ND INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2014, : 103 - 112