0% found this document useful (0 votes)
44 views

Implementing A Secure Design

This document discusses implementing secure design within agile software development processes. It outlines that security approaches need to be adaptive to agile methods, provide tools and guidance throughout development phases, and be flexible to adapt to rapid changes. A secure design can be implemented through user stories that contain reasons, goals and user types. Developers should be responsible for secure design implementation using contemporary security applications integrated into the software development life cycle. Proper tools and guidance can help organizations balance security concerns with agile development.

Uploaded by

John Ajope
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views

Implementing A Secure Design

This document discusses implementing secure design within agile software development processes. It outlines that security approaches need to be adaptive to agile methods, provide tools and guidance throughout development phases, and be flexible to adapt to rapid changes. A secure design can be implemented through user stories that contain reasons, goals and user types. Developers should be responsible for secure design implementation using contemporary security applications integrated into the software development life cycle. Proper tools and guidance can help organizations balance security concerns with agile development.

Uploaded by

John Ajope
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Running Head: IMPLEMENTING A SECURE DESIGN 1

Implementing a secure design

Name

Course

Tutor

Date
IMPLEMENTING A SECURE DESIGN 2

Introduction

Market development has increased the software demand, which has made it possible

and necessary to integrate new development processes in software development. In the event

of software Agile methods development solutions and requirements by a collaborative effort

of cross-functional and self-organizing teams alongside their end-users or customers. There

has always an issue or two with agile development related to security. Agile development

works, and it is due to this fact that many organizations accept it. Security is critical in the

software development process, making it quite vital to make changes in the process of

development before the software loses its essential elements that constitute its agility.

In her 2018 article "State of the art techniques for creating secure software within the

Agile process: a systematic literature review," Moneta outlines that various approaches need

to be considered when you want to ensure that security will not be an issue. First, the security

approach has to be adaptive to the methods used in software development. Such protection

should always run along the methods applied in software development so that it does not

hinder the development process. Also, because the agile process is swift, security integration

should always be made simple and effective.

Second, should the team decide to successfully integrate a security approach in the

development process alongside the methods, the procedure should offer firm tools and

guidance in all the development phases. For example, the tools and advice should be provided

by the approach from the capturing of requirements to software testing.

Lastly, the elements of security used in the system should be one that is flexible and

can adapt to changes swiftly and effectively. The business environment is changing at a fast
IMPLEMENTING A SECURE DESIGN 3

pace. The security implemented should be one that can adapt to such rapid changes, not

leaving behind the support for handling various iterations incremental.

Even with these approaches, the design needs to be as secure as possible to avoid

future issues. A secure design can be implemented through user stories. Such user stories

contain 'reasons,' 'goals,' and 'type of user,' making it possible to create functional and real

security. Secondly, secure, agile development should be in the hands of the developers. For

instance, a small team of about eight team members should be in charge of the

implementation of secure design (Nkomo & Coetzee, 2019, July).

Technology is changing swiftly, and it would be a great deal to include contemporary

security applications in the design. Integrating such continuous practices in SDLC can be

crucial in preventing security issues. Culture is essential when building for a system. Previous

software developments have encountered constant changes in culture, which may shift the

perception of security. To ensure that the system will remain firm and practical, any method

that is not serving the agile part should be sifted out of the system and only the vital and the

most current methods included in the development.

Conclusion

In a nutshell, the agile development process has become part of the contemporary

software development because it gives the development teams and organizations a better way

of keeping up with the current pace in the market and the ever-changing needs of customers.

It may seem like the security needs may be a problem with agile development processes. If

the proper use of tools and clear guidance are considered, the organization should hope to

strike the appropriate balance amidst security concerns and agile development.
IMPLEMENTING A SECURE DESIGN 4

References

Moneta, F. M. (2018). State of the art techniques for creating secure software within the

Agile process: a systematic literature review (Doctoral dissertation, University OF

Bologna).

Nkomo, P., & Coetzee, M. (2019, July). Software development activities for secure

microservices. In International Conference on Computational Science and Its

Applications (pp. 573-585). Springer, Cham.

You might also like