Evolution of Security Engineering Artifacts: A State of the Art Survey

Evolution of Security Engineering Artifacts: A State of the Art Survey

Michael Felderer (Institute of Computer Science, University of Innsbruck, Innsbruck, Austria), Basel Katt (Institute of Computer Science, University of Innsbruck, Innsbruck, Austria), Philipp Kalb (Institute of Computer Science, University of Innsbruck, Innsbruck, Austria), Jan Jürjens (Department of Software Engineering, Technical University of Dortmund, Dortmund, Germany), Martín Ochoa (Department of Software Engineering, Technical University of Munich, Munich, Germany), Federica Paci (Department of Information Engineering and Computer Science, University of Trento, Trento, Italy), Le Minh Sang Tran (Security Research Group, University of Trento, Trento, Italy), Thein Than Tun (Department of Computing, The Open University, Milton Keynes, UK), Koen Yskout (iMinds-DistriNet, KU Leuven, Leuven, Belgium), Riccardo Scandariato (iMinds-DistriNet, KU Leuven, Leuven, Belgium), Frank Piessens (iMinds-DistriNet, KU Leuven, Leuven, Belgium), Dries Vanoverberghe (iMinds-DistriNet, KU Leuven, Leuven, Belgium), Elizabeta Fourneret (SnT Centre, University of Luxembourg, Luxembourg), Matthias Gander (Institute of Computer Science, University of Innsbruck, Innsbruck, Austria), Bjørnar Solhaug (Information and Communication Technology (ICT), SINTEF, Oslo, Norway) and Ruth Breu (Institute of Computer Science, University of Innsbruck, Innsbruck, Austria)
Copyright: © 2014 |Pages: 51
DOI: 10.4018/ijsse.2014100103
OnDemand PDF Download:
$37.50

Abstract

Security is an important quality aspect of modern open software systems. However, it is challenging to keep such systems secure because of evolution. Security evolution can only be managed adequately if it is considered for all artifacts throughout the software development lifecycle. This article provides state of the art on the evolution of security engineering artifacts. The article covers the state of the art on evolution of security requirements, security architectures, secure code, security tests, security models, and security risks as well as security monitoring. For each of these artifacts the authors give an overview of evolution and security aspects and discuss the state of the art on its security evolution in detail. Based on this comprehensive survey, they summarize key issues and discuss directions of future research.
Article Preview

1. Introduction

Due to ever changing surroundings, new business needs, new regulations and new technologies, a software system must evolve, or it becomes progressively less satisfactory (Lehman, 1980, 1998). On the one hand, the continuous system evolution makes it especially challenging to keep software systems permanently secure as changes, either in the system itself or in its environment, may cause new threats and vulnerabilities. On the other hand, security artifacts themselves like security requirements, security architectures, and secure code or security tests have to be continuously adapted in long-running software systems. Because modern open and dynamically-changing software systems like service-oriented architectures or cloud deployments determine business process implementations and deal with critical data, managing the evolution of their security artifacts in all phases of the software development lifecycle (SDLC) is of high importance.

The main phases of the SDLC are analysis, design, implementation, testing, as well as deployment and operation (Braude & Bernstein, 2011). In each phase, specific artifacts are created or adapted, i.e., requirements in the analysis phase, the architecture in the design phase, source code in the implementation phase, tests in the testing phase, as well as the running system in the deployment and operation phase. All these artifacts are subject to changes which is one of the main difficulties of software evolution (Mens & Demeyer, 2008) with high impact on security engineering.

Security engineering focuses on security aspects in the software development lifecycle. Security aims at protecting information and systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. The main objective of security is to guarantee confidentiality, integrity and availability of information and systems. To be most effective, security must be integrated into the software development lifecycle from the very beginning (Kissel et al., 2008).

Risk management in general is the process allowing organizations to identify what assets need to be protected, what threats prevail and with what probability and severity losses could occur. As such it is an indispensable activity in security engineering to identifying and to manage threats and vulnerabilities to information as well as systems.

Model engineering involves the systematic use of models as essential artifacts throughout the software development process (Schmidt, 2006). It has recently been applied in security engineering to provide security models for all phases of the software development lifecycle to manage the evolution of security engineering artifacts.

Figure 1 gives an overview of the security engineering activities and the assigned artifacts in the secure software development lifecycle. In each iteration, the activities analysis, design, implementation, development as well as deployment are performed consecutively. Additionally, risk management and model engineering accompany these activities. As the system and its environment evolve, all these activities are executed iteratively which is represented by the surrounding border. Each phase handles specific artifacts, i.e., requirements, architecture, code, tests, running system, models and risks.

Figure 1.

Security engineering activities, security artifacts and section overview

Each of these artifacts corresponds to sections in this article with respect to its security-specific evolution aspects. Managing the evolution of security engineering artifacts is an important task that needs specific approaches to continuously guarantee security.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 8: 4 Issues (2017): 1 Released, 3 Forthcoming
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing