2020
DOI: 10.1007/978-3-030-58793-2_26
|View full text |Cite
|
Sign up to set email alerts
|

A Cloud SecDevOps Methodology: From Design to Testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Hence, adopting Security-by-Design through developing and implementing the Cloud Security Controls document is vital. The Security-by-Design approach, as defined by Casola et al (2020) and Santos, Tarrit, and Mirakhorli (2017), is designing the software from the foundation to be secure. At this aim, the alternate security tactics and patterns are first thought and, among them, the best are selected and enforced by the application designer, and then used as guiding principles for developers.…”
Section: Cloud Security Controlsmentioning
confidence: 99%
“…Hence, adopting Security-by-Design through developing and implementing the Cloud Security Controls document is vital. The Security-by-Design approach, as defined by Casola et al (2020) and Santos, Tarrit, and Mirakhorli (2017), is designing the software from the foundation to be secure. At this aim, the alternate security tactics and patterns are first thought and, among them, the best are selected and enforced by the application designer, and then used as guiding principles for developers.…”
Section: Cloud Security Controlsmentioning
confidence: 99%