BP: Security Concerns and Best Practices for Automation of Software Deployment Processes An Industrial Case Study

被引:18
|
作者
Mohan, Vaishnavi [1 ]
ben Othmane, Lotfi [2 ]
Kres, Andre [3 ]
机构
[1] Deloitte Analyt Inst, Berlin, Germany
[2] Iowa State Univ, Ames, IA USA
[3] IBM Corp, Berlin, Germany
关键词
D O I
10.1109/SecDev.2018.00011
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
SecDevOps is a paradigm for integrating the software development and operation processes considering security and compliance requirements. Organizations are reluctant to transform their development and operation processes to SecDevOps because of the expectation of incompatibility between security and DevOps. This paper reports about a study performed at IBM on transformation of five Business Intelligence (BI) projects to SecDevOps. The study revealed that main security concerns for the automation of the deployment process are: separation of roles, enforcement of access controls, manual security tests, audit, security guidelines, management of security issues, and participation of the security team. The major recommended best practices for a transformation of current processes to SecDevOps are: good documentation and logging, strong collaboration and communication, automation of the processes, and enforcement of separation of roles. Based on the empirical results, we conclude that separation of roles is the main aspect to be considered when planning to automate deployment processes. The results of the study are being used by IBM BI Unit and may be used by other organizations when planning to migrate to SecDevOps, especially for BI projects.
引用
收藏
页码:21 / 28
页数:8
相关论文
共 50 条
  • [31] An empirical study of industrial security-engineering practices
    Vaughn, RB
    Henning, R
    Fox, K
    JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 61 (03) : 225 - 232
  • [32] Extracting Software Security Concerns of Problem Frames Based on A Mapping Study
    Wu, Shuhui
    Zhang, Cheng
    Wang, Futian
    2017 24TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE WORKSHOPS (APSECW), 2017, : 121 - 125
  • [33] A methodology for evaluation the usability of software for industrial automation using artificial neural networks: case study - Eletrobras
    Moutinho da Ponte, Marcio Jose
    da Silveira, Antonio Morais
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING CONTROL & AUTOMATION, VOLS 1 AND 2, 2008, : 430 - 435
  • [34] Deployment of anti-virus software: A case study
    Sherif, Joseph S.
    Gilliam, David P.
    Information Management and Computer Security, 2003, 11 (01): : 5 - 10
  • [35] RFID Implementation and Security Concerns A Case Study of Pakistan
    Malik, Musab Umair
    Khan, Fahad Ahmed
    Malik, Farooq
    Ehsan, Nadeem
    Mirza, Ebtisam
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, : 36 - 40
  • [36] The implementation and deployment of an ERP system: An industrial case study
    Berchet, C
    Habchi, G
    COMPUTERS IN INDUSTRY, 2005, 56 (06) : 588 - 605
  • [37] The reality of best practices in transition: A case study
    Collet-Klingenberg, LL
    EXCEPTIONAL CHILDREN, 1998, 65 (01) : 67 - 78
  • [38] A Qualitative Study of Variability Management of Control Software for Industrial Automation Systems
    Fischer, Juliane
    Bougouffa, Safa
    Schlie, Alexander
    Schaefer, Ina
    Vogel-Heuser, Birgit
    PROCEEDINGS 2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2018, : 615 - 624
  • [39] TACO: An industrial case study of Test Automation for COverage
    Lesage, Benjamin
    Law, Stephen
    Bate, Iain
    PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON REAL-TIME NETWORKS AND SYSTEMS (RTNS 2018), 2018,
  • [40] Software Deployment Activities and Challenges - A Case Study of Four Software Product Companies
    Mantyla, Mika V.
    Vanhanen, Jari
    2011 15TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING (CSMR), 2011, : 131 - 139