2020
DOI: 10.1016/s1361-3723(20)30109-3
|View full text |Cite
|
Sign up to set email alerts
|

Security controls in infrastructure as code

Abstract: The development, deployment and management of software applications have shifted dramatically in the past 10 years. This fundamental shift is what we now know as development operations (DevOps). Infrastructure as Code (IaC) is one of the main tenets of DevOps. Previously, manual configuration via cloud providers’ UI consoles and physical hardware used to take place. But now, with the concept of IaC, the IT infrastructure can be automated by using blueprints that are easily readable by machines.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…The majority of Type VI studies were focused on how to improve tasks, processes and technologies to improve the instrumental outcomes as a measure of DevSecOps performance (McGraw, 2017;Casola et al, 2020;Almuairfi and Alenezi, 2020;Kersten, 2018). Within these group of studies, references were made to security policies, threat modelling and risk assessment processes, tasks such as code reviews, application security testing, static analysis, software composition analysis and dynamic analysis, dynamic application security testing (DAST), interactive application security testing, penetration testing, and technologies such as software containers, secure cloud applications and security tools.…”
Section: Resultsmentioning
confidence: 99%
“…The majority of Type VI studies were focused on how to improve tasks, processes and technologies to improve the instrumental outcomes as a measure of DevSecOps performance (McGraw, 2017;Casola et al, 2020;Almuairfi and Alenezi, 2020;Kersten, 2018). Within these group of studies, references were made to security policies, threat modelling and risk assessment processes, tasks such as code reviews, application security testing, static analysis, software composition analysis and dynamic analysis, dynamic application security testing (DAST), interactive application security testing, penetration testing, and technologies such as software containers, secure cloud applications and security tools.…”
Section: Resultsmentioning
confidence: 99%
“…In our study, we investigate security vulnerabilities in infrastructure components. In the literature, researchers actively study the security of infrastructure as Code [17,18,19,20]. In their investigations, practitioners rely on tools for testing infrastructure security [21].…”
Section: Static Detection Of Bugsmentioning
confidence: 99%
“…In the literature, several security analyses have been conducted on IaC projects [17,18,19,20]. However, these studies are generally limited.…”
Section: Static Application Security Testingmentioning
confidence: 99%