First-time security audits as a turning point? Challenges for security practices in an industry software development team

Andreas Poller, Laura Kocksch, Katharina Kinder-Kurlanda, Felix Epp

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Abstract

Software development is often accompanied by security audits such as penetration tests, usually performed on behalf of the software vendor. In penetration tests security experts identify entry points for attacks in a software product. Many development teams undergo such audits for the first time if their product is attacked or faces new security concerns. The audits often serve as an eye-opener for development teams: they realize that security requires much more attention. However, there is a lack of clarity with regard to what lasting benefits developers can reap from penetration tests. We report from a one-year study of a penetration test run at a major software vendor, and describe how a software development team managed to incorporate the test findings. Results suggest that penetration tests improve developers' security awareness, but that long-lasting enhancements of development practices are hampered by a lack of dedicated security stakeholders and if security is not properly reflected in the communicative and collaborative structures of the organization.

Original languageEnglish
Title of host publicationCHI EA 2016 : #chi4good - Extended Abstracts, 34th Annual CHI Conference on Human Factors in Computing Systems
Number of pages7
PublisherAssociation for Computing Machinery
Publication date7 May 2016
Pages1288-1294
ISBN (Electronic)9781450340823
DOIs
Publication statusPublished - 7 May 2016
Externally publishedYes
MoE publication typeA4 Article in conference proceedings
Event34th Annual CHI Conference on Human Factors in Computing Systems, CHI EA 2016 - San Jose, United States
Duration: 7 May 201612 May 2016

Publication series

NameConference on Human Factors in Computing Systems - Proceedings
Volume07-12-May-2016

Bibliographical note

Publisher Copyright:
© 2016 Authors.

Fields of Science

  • Development practices
  • Organizational factors
  • Penetration testing
  • Qualitative study
  • Secure software engineering

Cite this