{"title":"Practices and challenges of threat modelling in agile environments","authors":"Paul Theurich, Josepha Witt, Sebastian Richter","doi":"10.1007/s00287-023-01549-5","DOIUrl":null,"url":null,"abstract":"Abstract Facing the increasing annual cybersecurity costs, threat modelling (TM) is a method to consider security as early as possible in the software development life cycle (SDLC). Thereby, TM helps to identify and address security-related design flaws in information systems. As the original TM approach is based on sequential development, it is not aligned with today’s predominantly agile environments. This results in several challenges. However, TM’s implementation in an agile development approach lacks the recommendations on how to tackle these challenges. Therefore, we assess the state-of-the-art of TM challenges and practices in agile environments by conducting a literature review covering 220 papers. Thereby, we identify nine categories of challenges and six categories of practices. We propose a valuable artefact for practitioners by mapping challenges and practices to the agile SDLC and by creating a matrix highlighting how the practices address the challenges of TM in an agile environment.","PeriodicalId":39769,"journal":{"name":"Informatik-Spektrum","volume":"107 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Informatik-Spektrum","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s00287-023-01549-5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0
Abstract
Abstract Facing the increasing annual cybersecurity costs, threat modelling (TM) is a method to consider security as early as possible in the software development life cycle (SDLC). Thereby, TM helps to identify and address security-related design flaws in information systems. As the original TM approach is based on sequential development, it is not aligned with today’s predominantly agile environments. This results in several challenges. However, TM’s implementation in an agile development approach lacks the recommendations on how to tackle these challenges. Therefore, we assess the state-of-the-art of TM challenges and practices in agile environments by conducting a literature review covering 220 papers. Thereby, we identify nine categories of challenges and six categories of practices. We propose a valuable artefact for practitioners by mapping challenges and practices to the agile SDLC and by creating a matrix highlighting how the practices address the challenges of TM in an agile environment.
期刊介绍:
Im Informatik Spektrum finden Sie aktuelle, praktisch verwertbare Informationen über technische und wissenschaftliche Trends und Entwicklungen aus allen Bereichen der Informatik. Die Zeitschrift enthält Übersichtsartikel und einführende Darstellungen sowie Berichte über Projekte und Fallstudien aus der Praxis. Interviews, Kolumnen und Buchrezensionen runden das Angebot ab.Bilden Sie sich weiter, erschließen Sie sich neue Sachgebiete oder verschaffen Sie sich einen Überblick. Informatik Spektrum richtet sich neben Informatikspezialisten auch an Praktiker und Studierende, die Interesse an der wissenschaftlichen Entwicklung und praktischen Anwendung der Informatik haben.Möchten Sie zu einem Heft beitragen, richten Sie Ihren Vorschlag gerne an den Chefredakteur Peter Pagel (peter.pagel@springer.com). Willkommen sind Beiträge zum jeweiligen Schwerpunkt ebenso wie Beiträge zum gesamten Themenspektrum der Informatik.