Security Metrics for Assessing Security Risks of Software in Agile Development Methods

Authors

  • Ala. A. Abdulrazeg Computer Engineering Department, Faculty of Engineering, Omar Al-Mukhtar University, El-Beida, Libya Author
  • Salim. A. Adrees Computer Engineering Department, Faculty of Engineering, Omar Al-Mukhtar University, El-Beida, Libya Author
  • Faitouri. A. Aboaoja Computer Science Department, Faculty of Science, University of Derna, Derna, Libya Author

DOI:

https://doi.org/10.58916/jhas.v10i4.1001

Keywords:

Agile Software Development, Security Activities, Security Metrics, Vulnerability Management

Abstract

Agile methodologies have become key players in modern software development, offering flexibility, rapid and customer-focused delivery. Integrating security practices into Agile workflows is critical for building resilient and trustworthy systems. However, security practices alone provide limited visibility into an application’s actual security posture. To address this gap, Agile teams require quantifiable, actionable security metrics that enable continuous assessment and improvement of security integration throughout the development process, a task that remains challenging due to the lack of such measures. This paper proposes a set of security metrics designed to evaluate the effectiveness of security activities across key Agile phases: before, during, and after each iteration. The proposed metrics focus on measurable artefacts such as threat model coverage, security acceptance criteria, secure coding adherence, security testing results, and post-iteration vulnerability management. These measures aim to assess how effectively teams deliver secure software while maintaining agility.

Downloads

Download data is not yet available.

Published

2025-10-20

How to Cite

Ala. A. Abdulrazeg, Salim. A. Adrees, & Faitouri. A. Aboaoja. (2025). Security Metrics for Assessing Security Risks of Software in Agile Development Methods . Bani Waleed University Journal of Humanities and Applied Sciences, 10(4), 213-224. https://doi.org/10.58916/jhas.v10i4.1001

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 10 > >> 

Similar Articles

1-10 of 178

You may also start an advanced similarity search for this article.