Security triage: A report of a lean security requirements methodology for cost-effective security analysis

M. Giacalone, R. Mammoliti, F. Massacci, F. Paci, R. Perugino, C. Selli

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

© 2014 IEEE.Poste Italiane is a large corporation offering integrated services in banking and savings, postal services, and mobile communication. Every year, it receives thousands of change requests for its ICT services. Applying to each and every request a security assessment 'by the book'is simply not possible. We report the experience by Poste Italiane of a lean methodology to identify security requirements that can be inserted in the production cycle of a normal company. The process is based on surveying the overall IT architectures (Security Survey) and then a lean dynamic process (Security Triage) to evaluate individual change requests, so that important changes get the attention they need, minor changes can be quickly implemented, and compliance and security obligations are met.
Original languageEnglish
Title of host publication2014 IEEE 4th International Workshop on Empirical Requirements Engineering, EmpiRE 2014 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages25-27
ISBN (Print)9781479963379
DOIs
Publication statusPublished - 3 Sept 2014
Externally publishedYes
Event2014 IEEE 4th International Workshop on Empirical Requirements Engineering, EmpiRE 2014 - Karlskrona, Sweden
Duration: 25 Aug 2014 → …

Publication series

Name2014 IEEE 4th International Workshop on Empirical Requirements Engineering, EmpiRE 2014 - Proceedings

Conference

Conference2014 IEEE 4th International Workshop on Empirical Requirements Engineering, EmpiRE 2014
Country/TerritorySweden
CityKarlskrona
Period25/08/14 → …

VU Research Profile

  • Connected World

Fingerprint

Dive into the research topics of 'Security triage: A report of a lean security requirements methodology for cost-effective security analysis'. Together they form a unique fingerprint.

Cite this