Closing the feedback loop between UX design, software development, security engineering, and operations

15Citations
Citations of this article
90Readers
Mendeley users who have this article in their library.
Get full text

Abstract

There have been many evolutions of the software development lifecycle (SDLC). These differing models have moved software development groups from sequential development to a more agile and iterative development model. Increasing awareness and research focused on the cyber security landscape has resulted in a large push for "shifting security left" in the SDLC. With security engineering teams engaged earlier and more often throughout the SDLC, security issues will be found and fixed earlier, which increases efficiency while lowering cost and overhead. While this has been an important cultural and infrastructural shift for many technology companies, there is still a gap in this feedback loop that needs to be bridged: the gap between user experience designers and the software, security, and IT/operations engineers. Tradeoffs have been made between security and usability-a challenge known as "usability versus security." Much of the research that propose how to change these two fields from opposing forces to being cross-functional allies offer simplified solutions but don't go into granular detail about solving the problem. This paper covers the evolution of the SDLC from the Waterfall model through the DevSecOps agile methodology and proposes a new development model: the Technology Development Lifecycle (TDLC). This TDLC model aims to keep designers, software engineers, security engineers, and IT/operations all within a tight feedback loop throughout a continuous integration/continuous development pipeline.We will discuss various workflows, use cases, and technologies that can be used later on to implement a working environment that can enforce the TDLC model.

Cite

CITATION STYLE

APA

Nguyen, J., & Dupuis, M. (2019). Closing the feedback loop between UX design, software development, security engineering, and operations. In SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education (pp. 93–98). Association for Computing Machinery, Inc. https://doi.org/10.1145/3349266.3351420

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free