
with extensive experience and diverse backgrounds.
Additionally, we acknowledge the potential influ-
ence of researchers on the objectivity of the collected
data and its analysis (Miles et al., 2014). To miti-
gate this, we followed the interview questionnaire as
closely as possible during the semi-structured inter-
views and employed cyclic coding in our analysis.
Transcription of the interviews further limited the in-
fluence of researcher-inherent bias.
Another notable limitation of this study lies in the
absence of experiments and practical applications of
our approach due to the complexity of the research
topic. However, such investigations are currently in
progress, even extending to cross-cutting concerns
beyond security, such as software architecture and
user experience.
7 CONCLUSION
The increasing adoption of LSAD, coupled with
the growing significance of security, necessitates ap-
proaches to achieve a balance between team auton-
omy and organizational control. Existing literature
recognizes this tension and its resultant challenges,
but comprehensive solutions remain scarce. To ad-
dress this gap, we employed a DSR approach to de-
velop solution artifacts. We combined this approach
with an expert interview study to improve our arti-
facts and ensure practical relevance and applicabil-
ity. Our approach aspires to harmonize governance
with LSAD by using a team autonomy assessment
as a determinant of role responsibilities and security
activity frequency. Our central recommendation is
that more capable and mature teams should receive
more autonomy, based on a documented and trans-
parent assessment and process model. This solution
balances the granted autonomy and required control
while preserving compliance and auditability. The ex-
pert evaluations generally endorse our approach while
illuminating areas for enhancement and additional re-
search opportunities. Future experiments should scru-
tinize the practicality of our approach, perhaps focus-
ing initially on a select few teams to increase feasi-
bility before scaling to larger environments. Prospec-
tive adaptations of the approach could also encom-
pass other cross-cutting concerns and non-functional
requirements beyond security.
ACKNOWLEDGEMENTS
This work has been supported by the German Federal
Ministry of Education and Research (BMBF) Soft-
ware Campus grant 01IS17049.
REFERENCES
Ambler, S. W. and Lines, M. (2020). Choose Your WoW: A
Disciplined Agile Delivery Handbook for Optimizing
Your Way of Working. PM Institute.
Bartsch, S. (2011). Practitioners’ perspectives on security in
agile development. In Sixth International Conference
on Availability, Reliability and Security (ARES), pages
479–484, Piscataway, NJ. IEEE.
Bell, L., Bird, J., Brunton-Spall, M., and Smith, R. (2017).
Agile application security: Enabling security in a
continuous delivery pipeline. O’Reilly Media, Se-
bastopol, CA.
Boldt, M., Jacobsson, A., Baca, D., and Carlsson, B. (2017).
Introducing a novel security-enhanced agile software
development process. International Journal of Secure
Software Engineering, 8(2):26–52.
D
¨
annart, S., Moy
´
on, F., and Beckers, K. (2019). An as-
sessment model for continuous security compliance
in large scale agile environments. In Advanced Infor-
mation Systems Engineering, pages 529–544, Cham,
Switzerland. Springer.
Dikert, K., Paasivaara, M., and Lassenius, C. (2016). Chal-
lenges and success factors for large-scale agile trans-
formations: A systematic literature review. Journal of
Systems and Software, 119:87–108.
Edison, H., Wang, X., and Conboy, K. (2021). Comparing
methods for large-scale agile software development:
A systematic literature review. IEEE Transactions on
Software Engineering, pages 1–23.
Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004).
Design science in IS research. MIS Quarterly, 28(1),
75–105.
Julisch, K. (2008). Security compliance: The next fron-
tier in security research. Proc. of the new security
paradigms workshop, 71–74.
Kalenda, M., Hyna, P., and Rossi, B. (2018). Scaling ag-
ile in large organizations: Practices, challenges, and
success factors. Journal of Software: Evolution and
Process, 30(10):p. 1954.
Knaster, R. and Leffingwell, D. (2020). SAFe 5.0 Dis-
tilled: Achieving Business Agility with the Scaled Ag-
ile Framework. Addison-Wesley, Boston.
Larman, C. and Vodde, B. (2016). Large-scale Scrum:
More with LeSS. Addison-Wesley, Boston and Am-
sterdam and London.
Microsoft (2012). Security development lifecycle - sdl pro-
cess guidance version 5.2.
Miles, M. B., Huberman, A. M., and Salda
˜
na, J. (2014).
Qualitative data analysis: A methods sourcebook.
SAGE, Thousand Oaks Califorinia, 3 edition.
Moyon, F., Almeida, P., Riofrio, D., Mendez, D., and Kali-
nowski, M. (2020). Security compliance in agile soft-
ware development: A systematic mapping study. In
46th Euromicro Conference on Software Engineering
Balancing Autonomy and Control: An Adaptive Approach for Security Governance in Large-Scale Agile Development
27