skip to main content
10.1145/3593434.3593966acmotherconferencesArticle/Chapter ViewAbstractPublication PageseaseConference Proceedingsconference-collections
research-article

Toward Successful Secure Software Deployment: An Empirical Study

Authors Info & Claims
Published:14 June 2023Publication History

ABSTRACT

Software deployment is the last stage of the software development life cycle (SDLC). It includes the execution of software in a customer environment. Nowadays, security has been integrated with the SDLC stages to produce secure software, improve software quality, and increase customer satisfaction. However, the software has become complex in recent execution environments, putting more pressure on securely deploying the software in these environments. This work extends our previous study published in [11], in which we have identified a list of best practices to address the secure software deployment challenges.

In our previous study, we categorized secure software deployment challenges into five levels of importance; critical, high, medium, low, and very low level. In this study, we provided best practices to overcome critical, high, and medium level challenges. Initially, a traditional literature review was conducted to identify best practices to overcome the challenges of secure software deployment. After that, data was collected via a questionnaire from 10 software deployment professionals to identify best practices that can be used to address the identified challenges. The outcome of this research assists software organizations in overcoming the challenges of secure software deployment. In addition, this study guides software organizations toward the secure deployment of software products.

References

  1. Paul, M. (2013). Official (ISC) 2 guide to the CSSLP CBK. CRC Press.‏Google ScholarGoogle ScholarCross RefCross Ref
  2. Dearle, A. (2007, May). Software deployment, past, present and future. In Future of Software Engineering (FOSE'07) (pp. 269-284). IEEE.‏Google ScholarGoogle Scholar
  3. Mirakhorli, M., Galster, M., & Williams, L. (2020). Understanding Software Security from Design to Deployment. ACM SIGSOFT Software Engineering Notes, 45(2), 25-26.‏Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Shahin, M., Babar, M. A., & Zhu, L. (2017). Continuous integration, delivery and deployment: a systematic review on approaches, tools, challenges and practices. IEEE Access, 5, 3909-3943.‏Google ScholarGoogle ScholarCross RefCross Ref
  5. Claps, G. G., Svensson, R. B., & Aurum, A. (2015). On the journey to continuous deployment: Technical and social challenges along the way. Information and Software technology, 57, 21-31.‏Google ScholarGoogle Scholar
  6. Frankel, S., Graveman, R., Pearce, J., & Rooks, M. (2010). Guidelines for the secure deployment of IPv6. NIST Special Publication, 800, 119.‏Google ScholarGoogle Scholar
  7. Jalalzai, M. H., Shahid, W. B., & Iqbal, M. M. W. (2015, January). DNS security challenges and best practices to deploy secure DNS with digital signatures. In 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST) (pp. 280-285). IEEE.‏Google ScholarGoogle ScholarCross RefCross Ref
  8. ISO/IEC 27001. (2021). INFORMATION SECURITY MANAGEMENT [Online] Available at: https://www.iso.org/isoiec-27001-information-security.html (Accessed on: 23/2/2021).Google ScholarGoogle Scholar
  9. Forrest Shull, Janice Singer, and Dag I.K. Sjøberg. Guide to advanced empirical software engineering. 2008.I S BN: 9781848000438.D O I:10.1007/978-1-84800-044-5.9Google ScholarGoogle ScholarCross RefCross Ref
  10. Keshta, I., Niazi, M., & Alshayeb, M. (2017). Towards implementation of requirements management specific practices (SP1. 3 and SP1. 4) for Saudi Arabian small and medium sized software development organizations. IEEE Access, 5, 24162-24183.‏Google ScholarGoogle ScholarCross RefCross Ref
  11. A. Alghamdi, Azzah, and Mahmood Niazi. "Challenges of Secure Software Deployment: An Empirical Study." Proceedings of the International Conference on Evaluation and Assessment in Software Engineering 2022. 2022.‏Google ScholarGoogle Scholar
  12. Fritz, T., Huang, E. M., Murphy, G. C., & Zimmermann, T. (2014, April). Persuasive technology in the real world: a study of long-term use of activity sensing devices for fitness. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 487-496).‏Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Terry, Gareth, "Thematic analysis." The SAGE handbook of qualitative research in psychology 2 (2017): 17-37.‏Google ScholarGoogle Scholar
  14. “CYBERSECURITY FRAMEWORK,” NIST. [Online] Available at: https://www.nist.gov/cyberframework (Accessed on: 23/2/2023).Google ScholarGoogle Scholar
  15. ISO/IEC 27001. (2021). INFORMATION SECURITY MANAGEMENT [Online] Available at: https://www.iso.org/isoiec-27001-information-security.html (Accessed on: 23/2/2023).Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    EASE '23: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering
    June 2023
    544 pages
    ISBN:9798400700446
    DOI:10.1145/3593434

    Copyright © 2023 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 14 June 2023

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate71of232submissions,31%
  • Article Metrics

    • Downloads (Last 12 months)52
    • Downloads (Last 6 weeks)10

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format