3.1 Step 1: Identifying RE best Security Practices for GSD Organizations
We used a systematic literature review (SLR) approach to investigate current RE security best practices for GSD, and our initial findings were recently presented at a conference [27]. The current paper extends our previous published study, exploring the RE security practices in the GSD context with industrial practitioners. We performed the following steps to perform the empirical study [4].