2020
DOI: 10.1007/978-3-030-58793-2_28
|View full text |Cite
|
Sign up to set email alerts
|

Secure Agile Software Development: Policies and Practices for Agile Teams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(11 citation statements)
references
References 26 publications
0
11
0
Order By: Relevance
“…The taxonomy has helped to structure the identified secure agile practices. While our study identified eight security practices at the implementation phase, there is a published work that showed only three practices at the same phase [29]. Our taxonomy will help to improve organization's security activities as it encompasses different practices (roles, ceremonies & artefacts) rather than previous research endeavor which focused only on the security roles in a team [9].…”
Section: Discussionmentioning
confidence: 94%
See 1 more Smart Citation
“…The taxonomy has helped to structure the identified secure agile practices. While our study identified eight security practices at the implementation phase, there is a published work that showed only three practices at the same phase [29]. Our taxonomy will help to improve organization's security activities as it encompasses different practices (roles, ceremonies & artefacts) rather than previous research endeavor which focused only on the security roles in a team [9].…”
Section: Discussionmentioning
confidence: 94%
“…Bezerra et. al., in [29] have grouped the agile security practices based on practitioners' assessment in a particular cyber security organization. Thus, a common finding of agile information systems development studies in the existing literature is that agile methods do sometimes comply with security requirements, but it is faced with the issues of higher cost and slower development due to inadequate agile security processes [8].…”
Section: Security and Agile For Information Systems Developmentmentioning
confidence: 99%
“…Additionally, we found 26 additional studies (37.6%) that present different approaches. One of these studies is oriented toward industry professionals [65], while another focuses on work teams [66], without considering the size of the company. A third study aims to identify secure software development practices that are critical for projects in companies of various sizes [67].…”
Section: A Response To Research Questionsmentioning
confidence: 99%
“…Considering the 14 articles that propose implementations, it is observed that 5 of these works do not provide an explicit conclusion about whether their practices are more effective or not when incorporating security measures into software development in SMEs. It is important to note, for example, that some of these works have only been validated by experts in the field of secure development, without indicating their effectiveness empirically, as evidenced in the studies by Treacy et al [71] and Bezerra et al [66]. Additionally, a study conducted by Humayun et al [72] evaluated their proposed framework using a mathematical model and a case study.…”
Section: A Response To Research Questionsmentioning
confidence: 99%
“…Bezerra et al 26 (Bezerra) have proposed five security policies consisting of multiple secure software development practices suitable for agile development teams. The methodology used to select these practices is to identify the practices from the existing literature, and a verification of these practices by conducting a workshop with a team of agile and security specialists.…”
Section: Identification and Synthesis Of Agile Secure Software Develo...mentioning
confidence: 99%