BP: Security Concerns and Best Practices for Automation of Software Deployment Processes An Industrial Case Study

被引:16
|
作者
Mohan, Vaishnavi [1 ]
ben Othmane, Lotfi [2 ]
Kres, Andre [3 ]
机构
[1] Deloitte Analyt Inst, Berlin, Germany
[2] Iowa State Univ, Ames, IA USA
[3] IBM Corp, Berlin, Germany
关键词
D O I
10.1109/SecDev.2018.00011
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
SecDevOps is a paradigm for integrating the software development and operation processes considering security and compliance requirements. Organizations are reluctant to transform their development and operation processes to SecDevOps because of the expectation of incompatibility between security and DevOps. This paper reports about a study performed at IBM on transformation of five Business Intelligence (BI) projects to SecDevOps. The study revealed that main security concerns for the automation of the deployment process are: separation of roles, enforcement of access controls, manual security tests, audit, security guidelines, management of security issues, and participation of the security team. The major recommended best practices for a transformation of current processes to SecDevOps are: good documentation and logging, strong collaboration and communication, automation of the processes, and enforcement of separation of roles. Based on the empirical results, we conclude that separation of roles is the main aspect to be considered when planning to automate deployment processes. The results of the study are being used by IBM BI Unit and may be used by other organizations when planning to migrate to SecDevOps, especially for BI projects.
引用
收藏
页码:21 / 28
页数:8
相关论文
共 50 条
  • [1] BEST PRACTICES IN AUTOMATION SECURITY
    McKay, Murray
    2012 IEEE-IAS/PCA 54TH CEMENT INDUSTRY TECHNICAL CONFERENCE, 2012,
  • [2] Best Practices for Software Security: An Overview
    Yasar, Ansar-Ul-Haque
    Preuveneers, Davy
    Berbers, Yolande
    Bhatti, Ghasan
    INMIC: 2008 INTERNATIONAL MULTITOPIC CONFERENCE, 2008, : 169 - +
  • [3] Security concerns for contemporary development practices -: A case study
    Tryfonas, T
    Kiountouzis, E
    TRUSTED INFORMATION: THE NEW DECADE CHALLENGE, 2001, 65 : 421 - 435
  • [4] Cloud Computing Security: Concerns, Strategies and Best Practices
    Francis, Tina
    Vadivel, S.
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 205 - 207
  • [5] Best practices for business process automation description - a case study
    Silvares, Catarina
    Sao Mamede, Henrique
    Costa, Joao
    ENTERPRISE INFORMATION SYSTEMS, 2024,
  • [6] The influence of software engineering on industrial automation processes
    Mejía-Neira Á.
    Jabba D.
    Caballero G.C.
    Caicedo-Ortiz J.
    Informacion Tecnologica, 2019, 30 (05): : 221 - 230
  • [7] BLENDED LEARNING IN ELECTRONICS AND AUTOMATION ENGINEERING: A STUDY OF SOFTWARE SUPPORT AND BEST PRACTICES
    Azuara, Guillermo
    Delgado, Jorge
    Gallardo, Jesus
    Carlos Garcia, Juan
    Gil, Eduardo
    Ibarz, Elena
    Lacuesta, Raquel
    Lopez, Ana
    Ube, Mariano
    9TH INTERNATIONAL CONFERENCE ON EDUCATION AND NEW LEARNING TECHNOLOGIES (EDULEARN17), 2017, : 1143 - 1149
  • [8] Implementing information security best practices on software lifecycle processes: The ISO/IEC 15504 Security Extension
    Mesquida, Antoni Lluis
    Mas, Antonia
    COMPUTERS & SECURITY, 2015, 48 : 19 - 34
  • [9] The concerns of prototypers and their mitigating practices: An industrial case-study
    Counsell, Steve
    Phalp, Keith
    Mendes, Emilia
    Geddes, Stella
    PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT, PROCEEDINGS, 2006, 4034 : 166 - 176
  • [10] Best Practices for Software Maturity Improvement: A GEANT Case Study
    Walter, Bartosz
    Marovic, Branko
    Garnizov, Ivan
    Wolski, Marcin
    Todosijevic, Andrijana
    SYSTEMS, SOFTWARE AND SERVICES PROCESS IMPROVEMENT (EUROSPI 2020), 2020, 1251 : 30 - 41