Enhancing security requirements engineering by organizational learning

  • Authors:
  • Kurt Schneider;Eric Knauss;Siv Houmb;Shareeful Islam;Jan Jürjens

  • Affiliations:
  • Leibniz Universität Hannover, Software Engineering Group, Welfengarten 1, 30167, Hannover, Germany;Leibniz Universität Hannover, Software Engineering Group, Welfengarten 1, 30167, Hannover, Germany;Secure-NOK AS, Sandnes, Norway;University of East London, School of Computing, IT and Engineering, 4-6 University way, E16 2RD, London, UK;TU Dortmund and Fraunhofer ISST, Chair for Software Engineering, Baroper Strasse 301, 44227, Dortmund, Germany

  • Venue:
  • Requirements Engineering - Special Issue on REFSQ 2011
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

More and more software projects today are security-related in one way or the other. Requirements engineers without expertise in security are at risk of overlooking security requirements, which often leads to security vulnerabilities that can later be exploited in practice. Identifying security-relevant requirements is labor-intensive and error-prone. In order to facilitate the security requirements elicitation process, we present an approach supporting organizational learning on security requirements by establishing company-wide experience resources and a socio-technical network to benefit from them. The approach is based on modeling the flow of requirements and related experiences. Based on those models, we enable people to exchange experiences about security-relevant requirements while they write and discuss project requirements. At the same time, the approach enables participating stakeholders to learn while they write requirements. This can increase security awareness and facilitate learning on both individual and organizational levels. As a basis for our approach, we introduce heuristic assistant tools. They support reuse of existing experiences that are relevant for security. In particular, they include Bayesian classifiers that issue a warning automatically when new requirements seem to be security-relevant. Our results indicate that this is feasible, in particular if the classifier is trained with domain-specific data and documents from previous projects. We show how the ability to identify security-relevant requirements can be improved using this approach. We illustrate our approach by providing a step-by-step example of how we improved the security requirements engineering process at the European Telecommunications Standards Institute (ETSI) and report on experiences made in this application.