A4 Refereed article in a conference publication

Case Study of Security Development in an Agile Environment: Building Identity Management for a Government Agency




AuthorsKalle Rindell, Sami Hyrynsalmi, Ville Leppänen

EditorsDominik Engel, Stephen B. Wicker,

Conference nameInternational Conference on Availability, Reliability and Security

Publication year2016

Book title Proceedings of 11th International Conference on Availability, Reliability and Security (ARES)

First page 556

Last page563

Number of pages8

ISBN978-1-5090-0990-9

DOIhttps://doi.org/10.1109/ARES.2016.45(external)

Web address http://ieeexplore.ieee.org/document/7784619/(external)


Abstract

In contemporary software development projects and computing tasks,
security concerns have an increasing effect, and sometimes even guide
both the design and the project's processes. In certain environments,
the demand for the security becomes the main driver of the development.
In these cases, the development of the product requires special security
arrangements for development and hosting, and specific
security-oriented processes for governance. Compliance with these
requirements using agile development methods may not only be a chance to
improve the project efficiency, but can in some cases, such as in the
case discussed in this paper, be an organizational requirement. This
paper describes a case of building a secure identity management system
and its management processes, in compliance with the Finnish
government's VAHTI security instructions. The building project was to be
implemented in accordance to the governmental security instructions,
while following the service provider's own management framework. Project
itself was managed with Scrum. The project's steering group required
the use of Scrum, and this project may be viewed as a showcase of
Scrum's suitability to multi-teamed, multi-site, security
standard-compliant work. We also discuss the difficulties of fulfilling
strict security regulations regarding both the development process and
the end product in this project, and the difficulties utilizing Scrum to
manage a multi-site project organization. Evaluation of the effects of
the security work to project cost and efficiency is also presented.
Finally, suggestions to enhance the Scrum method for security-related
projects are made.


Downloadable publication

This is an electronic reprint of the original article.
This reprint may differ from the original in pagination and typographic detail. Please cite the original version.





Last updated on 2024-26-11 at 21:03