2018 IEEE Cybersecurity Development (SecDev) 2018
DOI: 10.1109/secdev.2018.00032
|View full text |Cite
|
Sign up to set email alerts
|

Rethinking Secure DevOps Threat Modeling: The Need for a Dual Velocity Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…CCH10 (Data Provenance Problem) data provenance means location of particular data when and where that data was generated [60]. Data provenance is one of the biggest challenges identified from literature to authenticate data.…”
Section: A Findings Of Slr (Rq1)mentioning
confidence: 99%
“…CCH10 (Data Provenance Problem) data provenance means location of particular data when and where that data was generated [60]. Data provenance is one of the biggest challenges identified from literature to authenticate data.…”
Section: A Findings Of Slr (Rq1)mentioning
confidence: 99%
“…To meet the on-demand infrastructures and continuous delivery product, DevOps software organizations are searching for active development approaches. There are many challenges of DevOps identified in literature such as "lack of DevOps knowledge" [69], "conceptual gap between development and operation team" [70], "lack of efficient tools" [20], "continuous testing" [3] etc. However, prior work is done in domain of DevOps security.…”
Section: Background Of Devops Securitymentioning
confidence: 99%
“…DevOps provides automation to increase the speed of software delivery but there is a great challenge to maintain the momentum of speedy delivery while performing security activities in parallel [6]. A key security enabler is threat modeling acquiring highly skilled individuals.…”
Section: Related Workmentioning
confidence: 99%
“…A key security enabler is threat modeling acquiring highly skilled individuals. Valani [6] proposes a lightweight threat modeling approach relying on a correlation matrix. The correlation matrix mapped security requirements over application archetypes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation