Title :
Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring
Author :
Hesse, Tom-Michael ; Gartner, Stefan ; Roehm, Tobias ; Paech, Barbara ; Schneider, Klaus ; Bruegge, Bernd
Author_Institution :
Inst. of Comput. Sci., Univ. of Heidelberg, Heidelberg, Germany
Abstract :
Security issues can have a significant negative impact on the business or reputation of an organization. In most cases they are not identified in requirements and are not continuously monitored during software evolution. Therefore, the inability of a system to conform to regulations or its endangerment by new vulnerabilities is not recognized. In consequence, decisions related to security might not be taken at all or become obsolete quickly. But to evaluate efficiently whether an issue is already addressed appropriately, software engineers need explicit decision documentation. Often, such documentation is not performed due to high overhead. To cope with this problem, we propose to document decisions made to address security requirements. To lower the manual effort, information from heuristic analysis and end user monitoring is incorporated. The heuristic assessment method is used to identify security issues in given requirements automatically. This helps to uncover security decisions needed to mitigate those issues. We describe how the corresponding security knowledge for each issue can be incorporated into the decision documentation semiautomatically. In addition, violations of security requirements at runtime are monitored. We show how decisions related to those security requirements can be identified through the documentation and updated manually. Overall, our approach improves the quality and completeness of security decision documentation to support the engineering and evolution of security requirements.
Keywords :
formal specification; security of data; system documentation; end user monitoring; heuristic analysis; heuristic assessment method; organization; security decision documentation; security decisions; security issues; security knowledge; semiautomatic security requirements engineering; software engineers; software evolution; vulnerability; Context; Documentation; IEEE Potentials; Knowledge engineering; Monitoring; Security; Software; Security requirements engineering; decision documentation; decision knowledge; heuristic analysis; knowledge carrying software; software evolution; user mon-itoring;
Conference_Titel :
Evolving Security and Privacy Requirements Engineering (ESPRE), 2014 IEEE 1st Workshop on
Conference_Location :
Karlskrona
DOI :
10.1109/ESPRE.2014.6890520