Proceedings of the 13th International Conference on Availability, Reliability and Security 2018
DOI: 10.1145/3230833.3233275
|View full text |Cite
|
Sign up to set email alerts
|

Software Security Activities that Support Incident Management in Secure DevOps

Abstract: Many software services are currently created using DevOps, where developers and operations personnel are more tightly integrated. The DevOps paradigm enables shorter development cycles, but increased speed has raised concerns over whether security issues may be overlooked. However, perfect security is never achievable, and in addition to the proactive software security efforts, we also need a reactive effort to handle flaws and bugs that are not discovered before they are used in an attack. In this paper we ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(16 citation statements)
references
References 14 publications
0
16
0
Order By: Relevance
“…DevOps is usually allied with cloud implementations which help deploy security integration and carry out penetration tests between applications. 80,81 Nowadays, cloud providers offer services that promote the usage of DevOps, in which a security model for their customers is ensured. 82 As discussed earlier, DevOps is not only focused on automating processes and improved performance, but also on cross team collaboration and interaction between people.…”
Section: Ta B L Ementioning
confidence: 99%
“…DevOps is usually allied with cloud implementations which help deploy security integration and carry out penetration tests between applications. 80,81 Nowadays, cloud providers offer services that promote the usage of DevOps, in which a security model for their customers is ensured. 82 As discussed earlier, DevOps is not only focused on automating processes and improved performance, but also on cross team collaboration and interaction between people.…”
Section: Ta B L Ementioning
confidence: 99%
“…Challenge of unrestricted collaboration [20], [23], [58], [79] CH12 Using unsuitable performance metrics for security evaluation [2], [69], [78], [79] CH13 Abundance of information is a serious threat to secure data [60], [62], [80] CH14 Use of immature automated deployment tools [61], [81], [82] CH15 Inadequate channel to monitor the collaboration of teams [52], [53], [71], [79]…”
Section: Ch11mentioning
confidence: 99%
“…Proper trainings and meeting sessions should be conducted to improve the expertise of teams. The capabilities to support and encourage team members by leadership to control the abundance of information causing problems to secure data[60,62,80] will process DevOps smoothly.The other frequently occurred challenge in an organization to secure DevOps activities is immature automated deployment tools[61,81,82], due to lack of testing knowledge. The DevOps team must corporate with security team to measure such challenging factors.…”
mentioning
confidence: 99%
“…A number of studies [40]- [45] have explicitly studied the management of NFRs in a CSE context; however, none of them focus on the associated lack of shared understanding. Feitelson describes how Facebook uses an open source tool, Perflab, to provide metrics which Facebook monitors to evaluate the PERFORMANCE of their system [43].…”
Section: Continuous Software Engineeringmentioning
confidence: 99%
“…For software SECURITY, Jaatun argues that proper attention to incident management, including involding and educating developers, can help alleviate SECURITY issues in CSE [40]; although this is strictly for SECURITY and is primarily focused on the Building Security In Maturity Model [46].…”
Section: Continuous Software Engineeringmentioning
confidence: 99%