• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. The trouble with security requirements
 
  • Details
  • Full
Options
2017
Conference Paper
Title

The trouble with security requirements

Abstract
Manifold approaches to security requirements engineering have been proposed, yet there is no consensus how to elicit, analyze, or express security needs. This perspective paper systematizes the problem space of security requirements engineering. Security needs result from the interplay of three dimensions: threats, security goals, and system design. Elementary statements can be made in each dimension, but such one-dimensional requirements remain partial and insufficient. To understand security needs, one has to analyze their interaction. Distinct analysis tasks arise for each pair of dimensions and are supported by different techniques: risk analysis, as in CORAS, between threats and security goals; security design, as exemplified by the framework of Haley et al., between goals and design; and security design analysis, such as Microsoft's threat modeling technique with data flow diagrams and STRIDE, between design and threats. All three perspectives are necessary to develop secure systems. Security requirements engineering must iterate through them, because threats determine the relevance of security goals, security design seeks ways to fulfill them, and design choices themselves influence threats and security goals.
Author(s)
Türpe, Sven
Fraunhofer-Institut für Sichere Informationstechnologie SIT  
Mainwork
IEEE 25th International Requirements Engineering Conference, RE 2017. Proceedings  
Conference
International Requirements Engineering Conference (RE) 2017  
Open Access
File(s)
Download (271.41 KB)
DOI
10.24406/publica-r-397885
10.1109/RE.2017.13
Language
English
Fraunhofer-Institut für Sichere Informationstechnologie SIT  
Keyword(s)
  • access control

  • analytical model

  • computer security

  • requirement engineering

  • software

  • stakeholder

  • computer security

  • information security

  • security risk

  • software design

  • solution design

  • system analysis and design

  • threat model

  • vulnerability

  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024