Towards a successful secure software acquisition

Faisal Alnaseef, Mahmood Niazi*, Sajjad Mahmood, Mohammad Alshayeb, Irfan Ahmad

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

Context: Security is a critical attribute of software quality. Organizations invest considerable sums of money in protecting their assets. Despite investing in secure infrastructure, organizations remain prone to security risks and cyberattacks that exploit security flaws. Many factors contribute to the challenges related to software security, e.g., the exponential increase in Internet-enabled applications, threats from hackers, and the susceptibility of inexperienced Internet users. Moreover, organizations tend to procure off-the-shelf software from third-party suppliers. However, gaining a complete understanding of ways to assess suppliers’ readiness to provide secure software before selecting a supplier is imperative. Objective: We have developed a readiness model for secure software acquisition (RMSSA) to help software organizations select suppliers who can provide secure software. Method: We employed state-of-the-art techniques based on systematic literature review to determine the best practices undertaken by organizations in terms of acquiring secure software, which depends on six core security knowledge areas: confidentiality, integrity, availability, authorization, authentication, and accountability. Results: We evaluated the RMSSA theoretically and in a practical environment based on three case studies with software organizations. Our findings can guide software organizations in selecting the supplier who can develop secure software. Conclusion: The proposed RMSSA can be used to evaluate suppliers’ readiness to provide secure software.

Original languageEnglish
Article number107315
JournalInformation and Software Technology
Volume164
DOIs
StatePublished - Dec 2023

Bibliographical note

Funding Information:
The authors would like to acknowledge the support provided by the Deanship of Research Oversight and coordination at King Fahd University of Petroleum and Minerals, Saudi Arabia , under Research Grant DF191039 .

Publisher Copyright:
© 2023 Elsevier B.V.

Keywords

  • Empirical software engineering
  • Software acquisition
  • Software process
  • Software security
  • Systematic reviews

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Towards a successful secure software acquisition'. Together they form a unique fingerprint.

Cite this