Part I: Getting Started 1. Why Read This Book? 2. A Brief History of Security Practices 3. An Agile Overview 4. Security Requirements 5. The Definition of Done and Its Role in Security-Driven Agile Development 6. An Introduction to Abuser Stories. Thinking Like the Bad Guy 7. Writing Abuser Stories 8. Abuser Roles 9. Gathering Abuser Stories 10. Roles and Responsibilities. Who Writes What? 11. Refutation Criteria and Acceptable Risk 12. Writing Good Abuser Stories
Part II: Estimating and Planning 13. Ranking Abuser Stories on the Product Backlog 14. Estimating Abuser Stories 15. Planning an Iteration with a Security-Driven Mindset 16. Planning a Release with a Security-Driven Mindset