Skip to main content

Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10446))

Abstract

The paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated by referring to a case study of development of a medical domain related application that is supposed to meet the requirements imposed by the IEC 62443-4.1 standard.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Microsoft Security Development Lifecycle (SDL). https://www.microsoft.com/en-us/sdl/

  2. Building Security in Maturity Model (BSIMM). https://www.bsimm.com/

  3. ISO/IEC 27034 series Application security. http://www.iso27001security.com/html/27034.html

  4. IEC 62443-4-1 4-1: Secure product development life-cycle requirements

    Google Scholar 

  5. Manifesto for Agile Software Development. http://agilemanifesto.org

  6. Schwaber, K., Beedle, M.: Agile Software Development with Scrum. Prentice Hall, Upper Saddle River (2002)

    MATH  Google Scholar 

  7. Beck, K., Andres, C.: Extreme Programming Explained. Addison-Wesley Professional, Boston (2004)

    Google Scholar 

  8. Knaster, R., Leffingwell, D.: SAFe Distilled: Applying the Scaled Agile Framework for Lean Software and Systems Engineering. Addison-Wesley Professional (2017)

    Google Scholar 

  9. Scrum of Scrums | Agile Alliance. https://www.agilealliance.org/glossary/scrum-of-scrums/

  10. Kim, G., Willis, J., Debois, P., Humble, J., Allspaw, J.: The DevOps Handbook. Trade Select (2016)

    Google Scholar 

  11. Paige, R.F., Charalambous, R., Ge, X., Brooke, P.J.: Towards agile engineering of high-integrity systems. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 30–43. Springer, Heidelberg (2008). doi:10.1007/978-3-540-87698-4_6

    Chapter  Google Scholar 

  12. Rasmussen, R., Hughes, T., Jenks, J., Skach, J.: Adopting agile in an FDA regulated environment. In: Proceedings of the 2009 Agile Conference, pp. 151–155 (2009)

    Google Scholar 

  13. McHugh, M., McCaffery, F., Coady, G.: An agile implementation within a medical device software organisation. Commun. Comput. Inf. Sci. 477, 190–201 (2014)

    Google Scholar 

  14. Myklebust, T., Stålhane, T., Hanssen, G.: Use of agile practices when developing safety-critical software. In: Proceeding of International System Safety Conference (2016)

    Google Scholar 

  15. Łukasiewicz, K., Górski, J.: AgileSafe – a method of introducing agile practices into safety-critical software development processes. In: Proceedings of the 2016 Federated Conference on Computer Science and Information Systems (2016)

    Google Scholar 

  16. Ambler, S.: IBM agility@scale™: Become as Agile as You Can Be. IBM (2010)

    Google Scholar 

  17. Ambler, S.: Agility at Scale: Results from the Summer 2012 DDJ State of the IT Union Survey. http://www.ambysoft.com/surveys/stateOfITUnion201209.html

  18. Boström, G., Wäyrynen, J., Bodén, M., Beznosov, K., Kruchten, P.: Extending XP practices to support security requirements engineering. In: Proceedings of the 2006 International Workshop on Software Engineering for Secure Systems - SESS 2006, pp. 11–18 (2006)

    Google Scholar 

  19. ISO/IEC 15026 Systems and software engineering – Systems and software assurance

    Google Scholar 

  20. NOR-STA tool. www.argevide.com

  21. Weinstock, C., Goodenough, J.: Towards an assurance case practice for medical devices. Technical Note Software Engineering Institute (2009)

    Google Scholar 

  22. FDA: Guidance – Total Product Life Cycle: Infusion Pump-Premarket Notification Submissions [510 (k)] (2010)

    Google Scholar 

  23. Weinstock, C.B., Lipson, H.F., Goodenough J.: Arguing security – creating security assurance cases. In: Software Engineering Institute Report (2007). http://resources.sei.cmu.edu/asset_files/WhitePaper/2013_019_001_293637.pdf

  24. Weinstock, C.B, Lipson, H.F.: Evidence of assurance: laying the foundation for a credible security case. In: Software Engineering Institute Report (2013), https://resources.sei.cmu.edu/asset_files/WhitePaper/2013_019_001_295685.pdf

  25. Alexander, R., Hawkins, R., Kelly, T.: Security assurance cases: motivation and the state of the art. In: University of York Report Number: CESG/TR/2011/1 (2011)

    Google Scholar 

  26. Finnegan, A., McCaffery, F.: A Security argument pattern for medical device assurance cases. In: 2014 IEEE International Symposium on Software Reliability Engineering Workshops (2014)

    Google Scholar 

  27. Ray, A., Cleaveland, R.: Security assurance cases for medical cyber and physical systems. IEEE Des. Test 32, 56–65 (2015)

    Article  Google Scholar 

  28. Bright Inventions. http://brightinventions.pl/

  29. iBeacon - Apple Developer. https://developer.apple.com/ibeacon/

  30. Łukasiewicz, K.: Method of selecting programming practices for the safety-critical software development projects – a case study. Technical report n. 02/2017. Gdańsk University of Technology (2017)

    Google Scholar 

  31. Your heart rate. What it means, and where on Apple Watch you’ll find it. https://support.apple.com/en-us/HT204666

  32. Cyra, L., Górski, J.: Support for argument structures review and assessment. Reliab. Eng. Syst. Safety 96, 26–37 (2011)

    Article  Google Scholar 

  33. Stalhane, T., Hanssen, G., Myklebust, T.: The Application of SafeScrum to IEC 61508 certifiable Software, January 2014

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Katarzyna Łukasiewicz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Górski, J., Łukasiewicz, K. (2017). Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science(), vol 10446. Springer, Cham. https://doi.org/10.1007/978-3-319-65127-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65127-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65126-2

  • Online ISBN: 978-3-319-65127-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics