A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development

نویسندگان

  • Steve Harrison
  • Antonis Tzounis
  • Leandros A. Maglaras
  • François Siewe
  • Richard Smith
  • Helge Janicke
چکیده

This study examines the traditional approach to software development within the United Kingdom Government and the accreditation process. Initially we look at the Waterfall methodology that has been used for several years. We discuss the pros and cons of Waterfall before moving onto the Agile Scrum methodology. Agile has been adopted by the majority of Government digital departments including the Government Digital Services. Agile, despite its ability to achieve high rates of productivity organized in short, flexible, iterations, has faced security professionals’ disbelief when working within the U.K. Government. One of the major issues is that we develop in Agile but the accreditation process is conducted using Waterfall resulting in delays to go live dates. Taking a brief look into the accreditation process that is used within Government for I.T. systems and applications, we focus on giving the accreditor the assurance they need when developing new applications and systems. A framework has been produced by utilising the Open Web Application Security Project’s (OWASP) Application Security Verification Standard (ASVS). This framework will allow security and Agile to work side by side and produce secure code.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Integrated Framework for Security Enhancement in Agile Development using Fuzzy Logic

Agile methods are widely employed to develop high-quality software, but theoretical analyses argue that agile methods are inadequate for security-critical projects. However, most agiledeveloped software today needs to satisfy baseline security requirements, so that we need to focus on how to achieve this level for typical agile projects. Software grows up through its life cycle, so software dev...

متن کامل

Fuzzy Logic Approach for Threat Prioritization in Agile Security Framework using DREAD Model

For a qualitative system sound security practices must be a crucial part throughout the entire software lifecycle. Furthermore, agile software development has paved the way for overcoming the problems faced by developers during traditional development process. In the given paper we are using an Agile Security Framework that is compatible with practices of agile processes and inherit in it the b...

متن کامل

Designing an E-Government Model in the Ethical Framework of Good Governance

Background: Good governance within the framework of ethics is active and constructive cooperation between government and citizens, and the key to its success lies in the ethical behavior of the participating powers in political management. The success of e-government requires elements of good governance based on ethics. To realize e-government, we need good ethical governance indicators. Theref...

متن کامل

Penetration Testing in Agile Software Development Projects

Agile development methods are commonly used to iteratively develop the information systems and they can easily handle ever-changing business requirements. Scrum is one of the most popular agile software development frameworks. The popularity is caused by the simplified process framework and its focus on teamwork. The objective of Scrum is to deliver working software and demonstrate it to the cu...

متن کامل

Service-Oriented Architecture for Command and Control Systems with Dynamic Reconfiguration

Command and Control (C2) systems are evolving as warfighting is changing. Modern warfighting needs a dynamic, adaptable and agile force supported by rapidly changing technology. Three important C2 system characteristics are: survivability, rapid development and evaluation, and interoperability. This paper proposes a Service-Oriented Architecture with Dynamic Reconfiguration (SOADR) for the DoD ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1604.02368  شماره 

صفحات  -

تاریخ انتشار 2016