2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE) 2019
DOI: 10.1109/icse.2019.00033
|View full text |Cite
|
Sign up to set email alerts
|

The Seven Sins: Security Smells in Infrastructure as Code Scripts

Abstract: Context: Security smells are coding patterns in source code that are indicative of security weaknesses. As infrastructure as code (IaC) scripts are used to provision cloud-based servers and systems at scale, security smells in IaC scripts could be used to enable malicious users to exploit vulnerabilities in the provisioned systems. Goal: The goal of this paper is to help practitioners avoid insecure coding practices while developing infrastructure as code (IaC) scripts through an empirical study of security sm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

5
86
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 143 publications
(91 citation statements)
references
References 48 publications
5
86
0
Order By: Relevance
“…Previous work has introduced generic [44] or specialized [9,36] linters that can help developers to improve their CD configurations. In contrast to previous work on CI smells that relies on historical information [44], in this paper, we proposed CD-Linter, a static analysis tool able to identify four types of CD smells in CD pipelines, right when they are introduced in the pipeline configuration.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Previous work has introduced generic [44] or specialized [9,36] linters that can help developers to improve their CD configurations. In contrast to previous work on CI smells that relies on historical information [44], in this paper, we proposed CD-Linter, a static analysis tool able to identify four types of CD smells in CD pipelines, right when they are introduced in the pipeline configuration.…”
Section: Discussionmentioning
confidence: 99%
“…While those smells are more similar to traditional code smells (i.e., they concern with maintainability and understandability of Puppet code), CD-Linter detects smells specific to the CI/CD configuration where developers violate principles. Rahman et al [36] implemented a linter that detects seven types of security problems in IaC scripts. Their work is complementary to ours as it deals with a very specific category of problems related to IaC scripts.…”
Section: Detection Of Smells In Development Workflowsmentioning
confidence: 99%
See 1 more Smart Citation
“…Many infrastructure code analysis approaches have been proposed to identify security, availability and reliability issues. SLIC [38] detects seven security smells in Puppet manifests, including admin by default, hard-coded secret, suspicious comments, etc. FSMoVe [41] identifies ordering violations and missing notifiers in Puppet programs, which can cause the infrastructure become unavailable [3] or unreliable [39].…”
Section: Related Workmentioning
confidence: 99%
“…In software engineering research, smell detection has been a key topic [16]. Several studies have used a rule-based approach to detect smells in different artifacts such as objectoriented programs [9], service descriptions [10], and infrastructure automation scripts [11,15]. The rule-based approach is also popular in industry, for instance, so-called Lint tools for Docker, Chef, TerraForm, and Puppet, However, mostly, these tools use informal rules, and operate directly on source code.…”
Section: Introductionmentioning
confidence: 99%