skip to main content
10.1145/2851581.2892392acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
abstract

First-time Security Audits as a Turning Point?: Challenges for Security Practices in an Industry Software Development Team

Authors Info & Claims
Published:07 May 2016Publication History

ABSTRACT

Software development is often accompanied by security audits such as penetration tests, usually performed on behalf of the software vendor. In penetration tests security experts identify entry points for attacks in a software product. Many development teams undergo such audits for the first time if their product is attacked or faces new security concerns. The audits often serve as an eye-opener for development teams: they realize that security requires much more attention. However, there is a lack of clarity with regard to what lasting benefits developers can reap from penetration tests. We report from a one-year study of a penetration test run at a major software vendor, and describe how a software development team managed to incorporate the test findings. Results suggest that penetration tests improve developers' security awareness, but that long-lasting enhancements of development practices are hampered by a lack of dedicated security stakeholders and if security is not properly reflected in the communicative and collaborative structures of the organization.

References

  1. Rainer Böhme and Márk Félegyházi. 2010. Proc. GameSec '10. Springer Berlin Heidelberg, Chapter Optimal Information Security Investment with Penetration Testing, 21-37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Daniel Geer and John Harthorne. 2002. Penetration testing: a duet. In Computer Security Applications Conference, 2002. Proceedings. 18th Annual. 185-195. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Stina Matthiesen, Pernille Bjørn, and Lise Møller Petersen. 2014. "Figure out How to Code with the Hands of Others": Recognizing Cultural Blind Spots in Global Software Development. In Proc. CSCW'14. ACM, New York, NY, USA, 1107-1119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Gary McGraw, Sammy Migues, and Jacob West. 2015. Building Security In Maturity Model (BSIMM) Version 6. Technical Report. Cigital, Inc.Google ScholarGoogle Scholar
  5. Angela Sasse. 2011. Designing for Homer Simpson-D'Oh. Interfaces: The Quarterly Magazine of the BCS Interaction Group 86 (2011), 5-7.Google ScholarGoogle Scholar
  6. Rodrigo Werlinger, Kirstie Hawkey, David Botta, and Konstantin Beznosov. 2009. Security practitioners in context: Their activities and interactions with other stakeholders within organizations. International Journal of Human-Computer Studies 67, 7 (2009), 584 - 606. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Shundan Xiao, Jim Witschey, and Emerson Murphy-Hill. 2014. Social Influences on Secure Development Tool Adoption: Why Security Tools Spread. In Proc. CSCW '14. ACM, New York, NY, USA, 1095-1106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jing Xie, Heather Lipford, and Bei-Tseng Chu. 2012. Evaluating Interactive Support for Secure Programming. In Proc. CHI '12. ACM, New York, NY, USA, 2707-2716. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. First-time Security Audits as a Turning Point?: Challenges for Security Practices in an Industry Software Development Team

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI EA '16: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems
      May 2016
      3954 pages
      ISBN:9781450340823
      DOI:10.1145/2851581

      Copyright © 2016 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 May 2016

      Check for updates

      Qualifiers

      • abstract

      Acceptance Rates

      CHI EA '16 Paper Acceptance Rate1,000of5,000submissions,20%Overall Acceptance Rate6,164of23,696submissions,26%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader