On the Understandability of Design-Level Security Practices in Infrastructure-as-Code Scripts and Deployment Architectures

被引:0
作者
Ntentos, Evangelos [1 ]
Lueger, Nicole elisabeth [2 ]
Simhandl, Georg [1 ]
Zdun, Uwe [1 ]
Schneider, Simon [3 ]
Scandariato, Riccardo [3 ]
Ferreyra, NICOLaS E. DiAZ [3 ]
机构
[1] Univ Vienna, Fac Comp Sci, Res Grp Software Architecture, Vienna, Austria
[2] Univ Vienna, Fac Comp Sci, Doctoral Sch Comp Sci, Software Architecture Grp, Vienna, Austria
[3] Hamburg Univ Technol, Inst Software Secur, Hamburg, Germany
基金
奥地利科学基金会;
关键词
Infrastructure as code; modeling; best practices; controlled experiment; empirical software engineering; NORMALITY;
D O I
10.1145/3691630
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Infrastructure as Code (IaC) automates IT infrastructure deployment, which is particularly beneficial for continuous releases, for instance, in the context of microservices and cloud systems. Despite its flexibility in application architecture, neglecting security can lead to vulnerabilities. The lack of comprehensive architectural security guidelines for IaC poses challenges in adhering to best practices. We studied how developers interpret IaC scripts (source code) in two IaC technologies, Ansible and Terraform, compared to semi-formal IaC deployment architecture models and metrics regarding design-level security understanding. In a controlled experiment involving ninety-four participants, we assessed the understandability of IaC-based deployment architectures through source code inspection compared to semi-formal representations in models and metrics. We hypothesized that providing semi-formal IaC deployment architecture models and metrics as supplementary material would significantly improve the comprehension of IaC security-related practices, as measured by task correctness. Our findings suggest that semi-formal IaC deployment architecture models and metrics as supplementary material enhance the understandability of IaC security-related practices without significantly increasing duration. We also observed a significant correlation between task correctness and duration when models and metrics were provided.
引用
收藏
页数:37
相关论文
共 74 条
[1]   Measuring the accuracy of software vulnerability assessments: experiments with students and professionals [J].
Allodi, Luca ;
Cremonini, Marco ;
Massacci, Fabio ;
Shim, Woohyun .
EMPIRICAL SOFTWARE ENGINEERING, 2020, 25 (02) :1063-1094
[2]   Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment [J].
Allodi, Luca ;
Biagioni, Silvio ;
Crispo, Bruno ;
Labunets, Katsiaryna ;
Massacci, Fabio ;
Santos, Wagner .
FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 :23-39
[3]   A TEST OF GOODNESS OF FIT [J].
ANDERSON, TW ;
DARLING, DA .
JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 1954, 49 (268) :765-769
[4]  
[Anonymous], 2007, Release it!: design and deploy production-ready software
[5]  
[Anonymous], 2021, OWASP Cheat Sheet Series
[6]  
[Anonymous], 2021, Logging - OWASP Cheat Sheet Series
[7]  
Arce I., 2014, IEEE COMPUTER SOC CT
[8]   DevOps: Introducing Infrastructure-as-Code [J].
Artac, Matej ;
Borovsak, Tadej ;
Di Nitto, Elisabetta ;
Guerriero, Michele ;
Tamburri, Damian Andrew .
PROCEEDINGS OF THE 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C 2017), 2017, :497-498
[9]  
auth0Docs, 2021, Single Sign-On (SSO)
[10]  
AWS Documentation, 2021, Security Groups for Your VPC