Skip to main content
Top
Published in: Software Quality Journal 2/2023

26-04-2023

From DevOps to DevSecOps is not enough. CyberDevOps: an extreme shifting-left architecture to bring cybersecurity within software security lifecycle pipeline

Authors: Federico Lombardi, Alberto Fanton

Published in: Software Quality Journal | Issue 2/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Software engineering is evolving quickly leading to an urgency to discover more efficient development models. DevOps and its security-oriented extension DevSecOps promised to speed up the development process while ensuring more robust code. However, many third-party libraries and infrastructure vulnerabilities may still pose security flaws. Besides, regulatory compliance and standards go beyond secure software asking for comprehensive security and accurate infrastructure hardening. Thus, we may wonder: is DevSecOps enough? In this paper, we propose CyberDevOps, a novel architecture which integrates cybersecurity within DevSecOps. Specifically, (i) we revise software composition analysis to deal with nondeterministic environments and (ii) we incorporate vulnerability assessment and compliance within a further pipeline step. To assess the effectiveness of CyberDevOps, we conduct an experimental evaluation. Specifically, we attack a web application and we show how CyberDevOps is able to detect hidden defects while a standard DevSecOps pipeline fails. Furthermore, we assess code quality and security by comparing DevOps, DevSecOps, and CyberDevOps by monitoring two Conio code bases over a year. The results show that CyberDevOps helps to fix up to 100% of known bugs and vulnerabilities and improve significantly the code quality.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
After DevSecOps, SecDevOps have been proposed. Although we detail their difference in the next section, for the sake of simplicity, in this paper, we refer to them only as “DevSecOps.”
 
2
Falcon Spotlight has a 15-day free trial.
 
3
Conio OSINT-VA uses machine learning inferences inspired by the PASCAL Forecaster (Lombardi et al., 2019).
 
4
The wrapper for Pillow we implemented can be found on the pypi.org website Fanton.
 
7
The available Sonarqube metrics can be found in SonarSource S.A..
 
Literature
go back to reference Aniello, L., Baldoni, R., & Lombardi, F. (2016). A blockchain-based solution for enabling log-based resolution of disputes in multi-party transactions. In International Conference in Software Engineering for Defence Applications (pp. 53–58). Springer. Aniello, L., Baldoni, R., & Lombardi, F. (2016). A blockchain-based solution for enabling log-based resolution of disputes in multi-party transactions. In International Conference in Software Engineering for Defence Applications (pp. 53–58). Springer.
go back to reference Baldoni, R., Cerocchi, A., Ciccotelli, C., Donno, A., Lombardi, F., & Montanari, L. (2014). Towards a non-intrusive recognition of anomalous system behavior in data centers. In: International Conference on Computer Safety, Reliability, and Security (pp. 350–359). Springer. Baldoni, R., Cerocchi, A., Ciccotelli, C., Donno, A., Lombardi, F., & Montanari, L. (2014). Towards a non-intrusive recognition of anomalous system behavior in data centers. In: International Conference on Computer Safety, Reliability, and Security (pp. 350–359). Springer.
go back to reference Bass, L., Holz, R., Rimba, P., Tran, A. B., & Zhu, L. (2015) Securing a deployment pipeline. In 2015 IEEE/ACM 3rd International Workshop on Release Engineering (pp. 4–7). IEEE. Bass, L., Holz, R., Rimba, P., Tran, A. B., & Zhu, L. (2015) Securing a deployment pipeline. In 2015 IEEE/ACM 3rd International Workshop on Release Engineering (pp. 4–7). IEEE.
go back to reference Bird, J. (2016). DevOpsSec: Delivering secure software through continuous delivery. O’Reilly Media. Bird, J. (2016). DevOpsSec: Delivering secure software through continuous delivery. O’Reilly Media.
go back to reference Bosch, J. (2014). Continuous software engineering: An introduction. Continuous Software Engineering (pp. 3–13). Springer. Bosch, J. (2014). Continuous software engineering: An introduction. Continuous Software Engineering (pp. 3–13). Springer.
go back to reference Carter, K. (2017). Francois Raynaud on DevSecOps. IEEE Software, 34(5), 93–96.CrossRef Carter, K. (2017). Francois Raynaud on DevSecOps. IEEE Software, 34(5), 93–96.CrossRef
go back to reference Cash, S., Jain, V., Jiang, L., Karve, A., Kidambi, J., Lyons, M., Mathews, T., Mullen, S., Mulsow, M., & Patel, N. (2016). Managed infrastructure with IBM Cloud OpenStack Services. IBM Journal of Research and Development, 60(2–3), 6–1. Cash, S., Jain, V., Jiang, L., Karve, A., Kidambi, J., Lyons, M., Mathews, T., Mullen, S., Mulsow, M., & Patel, N. (2016). Managed infrastructure with IBM Cloud OpenStack Services. IBM Journal of Research and Development, 60(2–3), 6–1.
go back to reference Chaillan, N., & Yasar, H. (2019). Waterfall to DevSecOps in DoD. Technical report, Carnegie Mellon University Software Engineering Institute Air Force. Chaillan, N., & Yasar, H. (2019). Waterfall to DevSecOps in DoD. Technical report, Carnegie Mellon University Software Engineering Institute Air Force.
go back to reference Chen, L. (2015). Continuous delivery: Huge benefits, but challenges too. IEEE Software, 32(2), 50–54.CrossRef Chen, L. (2015). Continuous delivery: Huge benefits, but challenges too. IEEE Software, 32(2), 50–54.CrossRef
go back to reference Ciccotelli, C., Aniello, L., Lombardi, F., Montanari, L., Querzoni, L., & Baldoni, R. (2015). Nirvana: A non-intrusive black-box monitoring framework for rack-level fault detection. In: 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC) (pp. 11–20). IEEE. Ciccotelli, C., Aniello, L., Lombardi, F., Montanari, L., Querzoni, L., & Baldoni, R. (2015). Nirvana: A non-intrusive black-box monitoring framework for rack-level fault detection. In: 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC) (pp. 11–20). IEEE.
go back to reference Desai, R., & Nisha, T. (2021). Best practices for ensuring security in devops: A case study approach. Journal of Physics: Conference Series, 1964, 042045. Desai, R., & Nisha, T. (2021). Best practices for ensuring security in devops: A case study approach. Journal of Physics: Conference Series, 1964, 042045.
go back to reference Digkas, G., Chatzigeorgiou, A. N., Ampatzoglou, A., & Avgeriou, P. C. (2020). Can clean new code reduce technical debt density. IEEE Transactions on Software Engineering. Digkas, G., Chatzigeorgiou, A. N., Ampatzoglou, A., & Avgeriou, P. C. (2020). Can clean new code reduce technical debt density. IEEE Transactions on Software Engineering.
go back to reference Dimov, A., & Dimitrov, V. (2021). Classification of software security tools, In: Information Systems and Grid Technologies. Dimov, A., & Dimitrov, V. (2021). Classification of software security tools, In: Information Systems and Grid Technologies.
go back to reference Fitzgerald, B., & Stol, K. -J. (2017). Continuous software engineering: A roadmap and agenda. Journal of Systems and Software, 123, 176–189.CrossRef Fitzgerald, B., & Stol, K. -J. (2017). Continuous software engineering: A roadmap and agenda. Journal of Systems and Software, 123, 176–189.CrossRef
go back to reference Hejase, H. J., Fayyad-Kazan, H. F., & Moukadem, I. (2020). Advanced persistent threats (APT): An awareness review. J. Econ. Econ. Educ. Res, 21, 1–8. Hejase, H. J., Fayyad-Kazan, H. F., & Moukadem, I. (2020). Advanced persistent threats (APT): An awareness review. J. Econ. Econ. Educ. Res, 21, 1–8.
go back to reference Hsu, T. (2018). Hands-on security in DevOps: ensure continuous security, deployment, and delivery with DevSecOps. Packt Publishing. Hsu, T. (2018). Hands-on security in DevOps: ensure continuous security, deployment, and delivery with DevSecOps. Packt Publishing.
go back to reference Hutchins, E. M., Cloppert, M. J., Amin, R. M., et al. (2011). Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research, 1(1), 80. Hutchins, E. M., Cloppert, M. J., Amin, R. M., et al. (2011). Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research, 1(1), 80.
go back to reference Imtiaz, N., Thorn, S., & Williams, L. (2021). A comparative study of vulnerability reporting by software composition analysis tools. In Proceedings of the 15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) (pp. 1–11). ACM. Imtiaz, N., Thorn, S., & Williams, L. (2021). A comparative study of vulnerability reporting by software composition analysis tools. In Proceedings of the 15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) (pp. 1–11). ACM.
go back to reference Leite, L., Rocha, C., Kon, F., Milojicic, D., & Meirelles, P. (2019). A survey of DevOps concepts and challenges. ACM Computing Surveys (CSUR), 52(6), 1–35.CrossRef Leite, L., Rocha, C., Kon, F., Milojicic, D., & Meirelles, P. (2019). A survey of DevOps concepts and challenges. ACM Computing Surveys (CSUR), 52(6), 1–35.CrossRef
go back to reference Leppänen, M., Mäkinen, S., Pagels, M., Eloranta, V.-P., Itkonen, J., Mäntylä, M. V., & Männistö, T. (2015). The highways and country roads to continuous deployment. IEEE Software, 32(2), 64–72.CrossRef Leppänen, M., Mäkinen, S., Pagels, M., Eloranta, V.-P., Itkonen, J., Mäntylä, M. V., & Männistö, T. (2015). The highways and country roads to continuous deployment. IEEE Software, 32(2), 64–72.CrossRef
go back to reference Leppänen, T., Honkaranta, A., & Costin, A. (2022). Trends for the DevOps security. A systematic literature review. In International Symposium on Business Modeling and Software Design (pp. 200–217). Springer. Leppänen, T., Honkaranta, A., & Costin, A. (2022). Trends for the DevOps security. A systematic literature review. In International Symposium on Business Modeling and Software Design (pp. 200–217). Springer.
go back to reference Letouzey, J. -L., & Coq, T. (2010). The sqale models for assessing the quality of real time source code. Toulouse: ERTSS 2010. Letouzey, J. -L., & Coq, T. (2010). The sqale models for assessing the quality of real time source code. Toulouse: ERTSS 2010.
go back to reference Lombardi, F., Muti, A., Aniello, L., Baldoni, R., Bonomi, S., & Querzoni, L. (2019). Pascal: An architecture for proactive auto-scaling of distributed services. Future Generation Computer Systems, 98, 342–361.CrossRef Lombardi, F., Muti, A., Aniello, L., Baldoni, R., Bonomi, S., & Querzoni, L. (2019). Pascal: An architecture for proactive auto-scaling of distributed services. Future Generation Computer Systems, 98, 342–361.CrossRef
go back to reference McCabe, T. (1976). A complexity measure ieee transactions on software engineering. IEEE Transactions on software Engineering, 2(4), 308–20.MathSciNetCrossRef McCabe, T. (1976). A complexity measure ieee transactions on software engineering. IEEE Transactions on software Engineering, 2(4), 308–20.MathSciNetCrossRef
go back to reference Mohan, V., & Othmane, L. B. (2016). SecDevOps: Is it a marketing buzzword? Mapping research on security in DevOps. In 2016 11th International Conference on Availability, Reliability and Security (ARES) (pp. 542–547). IEEE. Mohan, V., & Othmane, L. B. (2016). SecDevOps: Is it a marketing buzzword? Mapping research on security in DevOps. In 2016 11th International Conference on Availability, Reliability and Security (ARES) (pp. 542–547). IEEE.
go back to reference Nath, K., Dhar, S., & Basishtha, S. (2014). Web 1.0 to web 3.0-evolution of the web and its various challenges. In 2014 International Conference on Reliability Optimization and Information Technology (ICROIT) (pp. 86–89). IEEE. Nath, K., Dhar, S., & Basishtha, S. (2014). Web 1.0 to web 3.0-evolution of the web and its various challenges. In 2014 International Conference on Reliability Optimization and Information Technology (ICROIT) (pp. 86–89). IEEE.
go back to reference Paule, C. (2018). Securing DevOps: Detection of vulnerabilities in CD pipelines. Paule, C. (2018). Securing DevOps: Detection of vulnerabilities in CD pipelines.
go back to reference Prates, L., Faustino, J., Silva, M., & Pereira, R. (2019). DevSecOps metrics. In EuroSymposium on Systems Analysis and Design (pp. 77–90). Springer. Prates, L., Faustino, J., Silva, M., & Pereira, R. (2019). DevSecOps metrics. In EuroSymposium on Systems Analysis and Design (pp. 77–90). Springer.
go back to reference PuppetLabs. (2014). State of DevOps report. technical report 2014. PuppetLabs. (2014). State of DevOps report. technical report 2014.
go back to reference PuppetLabs. (2019). State of DevOps report. technical report 2019. PuppetLabs. (2019). State of DevOps report. technical report 2019.
go back to reference Rahman, A. A. U., & Williams, L. (2016). Software security in DevOps: Synthesizing practitioners’ perceptions and practices. In 2016 IEEE/ACM International Workshop on Continuous Software Evolution and Delivery (CSED) (pp. 70–76). IEEE. Rahman, A. A. U., & Williams, L. (2016). Software security in DevOps: Synthesizing practitioners’ perceptions and practices. In 2016 IEEE/ACM International Workshop on Continuous Software Evolution and Delivery (CSED) (pp. 70–76). IEEE.
go back to reference Rajapakse, R. N., Zahedi, M., Babar, M. A., & Shen, H. (2022). Challenges and solutions when adopting devsecops: A systematic review. Information and Software Technology, 141, 106700. Rajapakse, R. N., Zahedi, M., Babar, M. A., & Shen, H. (2022). Challenges and solutions when adopting devsecops: A systematic review. Information and Software Technology, 141, 106700.
go back to reference Sallin, M., Kropp, M., Anslow, C., Quilty, J. W., & Meier, A. (2021). Measuring software delivery performance using the four key metrics of DevOps. In International Conference on Agile Software Development (pp. 103–119). Cham: Springer. Sallin, M., Kropp, M., Anslow, C., Quilty, J. W., & Meier, A. (2021). Measuring software delivery performance using the four key metrics of DevOps. In International Conference on Agile Software Development (pp. 103–119). Cham: Springer.
go back to reference Schermann, G., Cito, J., Leitner, P., Zdun, U., & Gall, H. (2016). An empirical study on principles and practices of continuous delivery and deployment. PeerJ Preprints: Technical report.CrossRef Schermann, G., Cito, J., Leitner, P., Zdun, U., & Gall, H. (2016). An empirical study on principles and practices of continuous delivery and deployment. PeerJ Preprints: Technical report.CrossRef
go back to reference Shahin, M., Babar, M. A., & Zhu, L. (2017). Continuous integration, delivery and deployment: A systematic review on approaches, tools, challenges and practices. IEEE Access, 5, 3909–3943.CrossRef Shahin, M., Babar, M. A., & Zhu, L. (2017). Continuous integration, delivery and deployment: A systematic review on approaches, tools, challenges and practices. IEEE Access, 5, 3909–3943.CrossRef
go back to reference Shahin, M., Zahedi, M., Babar, M. A., & Zhu, L. (2019). An empirical study of architecting for continuous delivery and deployment. Empirical Software Engineering, 24(3), 1061–1108.CrossRef Shahin, M., Zahedi, M., Babar, M. A., & Zhu, L. (2019). An empirical study of architecting for continuous delivery and deployment. Empirical Software Engineering, 24(3), 1061–1108.CrossRef
go back to reference Stahl, D., Martensson, T., & Bosch, J. (2017). Continuous practices and DevOps: Beyond the buzz, what does it all mean? In 2017 43rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA) (pp. 440–448). IEEE. Stahl, D., Martensson, T., & Bosch, J. (2017). Continuous practices and DevOps: Beyond the buzz, what does it all mean? In 2017 43rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA) (pp. 440–448). IEEE.
go back to reference Zahedi, M., Rajapakse, R. N., & Babar, M. A. (2020). Mining questions asked about continuous software engineering: A case study of stack overflow. In Proceedings of the Evaluation and Assessment in Software Engineering (pp. 41–50). Association for Computing Machinery. Zahedi, M., Rajapakse, R. N., & Babar, M. A. (2020). Mining questions asked about continuous software engineering: A case study of stack overflow. In Proceedings of the Evaluation and Assessment in Software Engineering (pp. 41–50). Association for Computing Machinery.
Metadata
Title
From DevOps to DevSecOps is not enough. CyberDevOps: an extreme shifting-left architecture to bring cybersecurity within software security lifecycle pipeline
Authors
Federico Lombardi
Alberto Fanton
Publication date
26-04-2023
Publisher
Springer US
Published in
Software Quality Journal / Issue 2/2023
Print ISSN: 0963-9314
Electronic ISSN: 1573-1367
DOI
https://doi.org/10.1007/s11219-023-09619-3

Other articles of this Issue 2/2023

Software Quality Journal 2/2023 Go to the issue

Premium Partner