Secure Software Development Methodologies: A Multivocal Literature Review

11/29/2022
by   Arina Kudriavtseva, et al.
0

In recent years, the number of cyber attacks has grown rapidly. An effective way to reduce the attack surface and protect software is adoption of methodologies that apply security at each step of the software development lifecycle. While different methodologies have been proposed to address software security, recent research shows an increase in the number of vulnerabilities in software and data breaches. Therefore, the security practices incorporated in secure software development methodologies require investigation. This paper provides an overview of security practices involved in 28 secure software development methodologies from industry, government, and academia. To achieve this goal, we distributed the security practices among the software development lifecycle stages. We also investigated auxiliary (non-technical) practices, such as organizational, behavioral, legal, policy, and governance aspects that are incorporated in the secure software development methodologies. Furthermore, we explored methods used to provide evidence of the effectiveness of the methodologies. Finally, we present the gaps that require attention in the scientific community. The results of our survey may assist researchers and organizations to better understand the existing security practices integrated into the secure software development methodologies. In addition, our bridge between "technical" and "non-technical" worlds may be useful for non-technical specialists who investigate software security. Moreover, exploring the gaps that we found in current research may help improve security in software development and produce software with fewer number of vulnerabilities.

READ FULL TEXT
research
05/24/2022

DASP: A Framework for Driving the Adoption of Software Security Practices

Implementing software security practices is a critical concern in modern...
research
07/12/2023

Security in Online Freelance Software Development: A case for Distributed Security Responsibility

Secure software is a cornerstone to safe and resilient digital ecosystem...
research
02/10/2023

Machine Learning Based Approach to Recommend MITRE ATT CK Framework for Software Requirements and Design Specifications

Engineering more secure software has become a critical challenge in the ...
research
05/12/2022

Conversational DevBots for Secure Programming: An Empirical Study on SKF Chatbot

Conversational agents or chatbots are widely investigated and used acros...
research
03/30/2019

Estimation and Prediction of technical debt: a proposal

Technical debt is a metaphor used to convey the idea that doing things i...
research
11/20/2022

Semantic Similarity-Based Clustering of Findings From Security Testing Tools

Over the last years, software development in domains with high security ...
research
03/08/2013

Security Assessment of Software Design using Neural Network

Security flaws in software applications today has been attributed mostly...

Please sign up or login with your details

Forgot password? Click here to reset