Fundamentals of computer security technology
Fundamentals of computer security technology
Extreme programming explained: embrace change
Extreme programming explained: embrace change
Building secure software: how to avoid security problems the right way
Building secure software: how to avoid security problems the right way
Agile Software Development with Scrum
Agile Software Development with Scrum
Initial Industrial Experience of Misuse Cases in Trade-Off Analysis
RE '02 Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering
Threat Modeling
Software Security: Building Security In
Software Security: Building Security In
Security testing with Selenium
Companion to the 22nd ACM SIGPLAN conference on Object-oriented programming systems and applications companion
Hi-index | 0.00 |
In this paper, we present an approach that we have used to address security when running projects according to agile principles. Misuse stories have been added to user stories to capture malicious use of the application. Furthermore, misuse stories have been implemented as automated tests (unit tests, acceptance tests) in order to perform security regression testing. Penetration testing, system hardening and securing deployment have been started in early iterations of the project.