Vulnerabilities in infrastructure as code: what, how many, and who?

被引:0
作者
War, Aicha [1 ]
Diallo, Alioune [1 ]
Habib, Andrew [1 ,2 ]
Klein, Jacques [1 ]
Bissyande, Tegawende F. [1 ]
机构
[1] Univ Luxembourg, Esch Sur Alzette, Luxembourg
[2] ABB Corp Res Ctr Germany, Baden, Switzerland
关键词
DevOps; DevSecOps; SecDevOps; Infrastructure as code; Security testing; Security smells; Software vulnerability;
D O I
10.1007/s10664-025-10672-8
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Infrastructure as Code (IaC) is a pivotal approach for deploying and managing IT systems and services using scripts, offering flexibility and numerous benefits. However, the presence of security flaws in IaC scripts can have severe consequences, as exemplified by the recurring exploits of Cloud Web Services. Recent studies in the literature have investigated IaC security issues, but they often focus on individual components (IaC tools or scripts), providing only preliminary insights. Our research extends the current knowledge by conducting a comprehensive investigation into various aspects of IaC security, encompassing its components. We explore vulnerabilities in terms of types, their predominant locations, contributor responsibilities for introducing vulnerabilities, and more. Our methodology relies on widely adopted static security testing tools, which analyze over 1600 repositories to identify IaC vulnerabilities. Our empirical study yields valuable observations, highlighting severe and recurrent vulnerabilities within IaC, while also categorizing their severity and types. We delve deeper into vulnerability patterns, examining source code, dependencies, and manifest files across IaC components, including tools, scripts, and add-ons (libraries or plugin tools). The study uncovers that IaC components are plagued by exploitable vulnerabilities that span all ten categories of security bugs outlined in the OWASP Top 10 2021. Furthermore, our investigation reveals that even when maintainers employ security tools to address vulnerabilities, they do not integrate them systematically into their automation routines. Consequently, we propose that IT teams need to foster stronger collaboration across DevOps profiles (developers and IT operators) and break down the boundaries with security operators to enhance Infrastructure as Code's security posture through the adoption of DevSecOps practices.
引用
收藏
页数:40
相关论文
共 64 条
[1]  
Afaneh Suha, 2023, 2023 International Conference on Information Technology (ICIT), P102, DOI 10.1109/ICIT58056.2023.10226018
[2]  
Ahmed Zaheeruddin, 2019, 2019 International Conference on Digitization (ICD). Proceedings, P178, DOI 10.1109/ICD47981.2019.9105789
[3]   Toward successful DevSecOps in software development organizations: A decision-making framework [J].
Akbar, Muhammad Azeem ;
Smolander, Kari ;
Mahmood, Sajjad ;
Alsanad, Ahmed .
INFORMATION AND SOFTWARE TECHNOLOGY, 2022, 147
[4]  
Almuairfi S., 2020, Computer Fraud Security, P13, DOI [10.1016/S1361-3723(20)30109-3, DOI 10.1016/S1361-3723(20)30109-3]
[5]   Continuous Delivery with Jenkins Jenkins Solutions to Implement Continuous Delivery [J].
Armenise, Valentina .
2015 IEEE/ACM 3RD INTERNATIONAL WORKSHOP ON RELEASE ENGINEERING, 2015, :24-27
[6]   A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions [J].
Aslan, Omer ;
Aktug, Semih Serkant ;
Ozkan-Okay, Merve ;
Yilmaz, Abdullah Asim ;
Akin, Erdal .
ELECTRONICS, 2023, 12 (06)
[7]   Leveraging the Serverless Architecture for Securing Linux Containers [J].
Bila, Nilton ;
Dettori, Paolo ;
Kanso, Ali ;
Watanabe, Yuji ;
Youssef, Alaa .
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2017, :401-404
[8]  
Bird C, 2011, FSE, P4, DOI [DOI 10.1145/2025113.2025119, 10.1145/2025113.2025119]
[9]   Analysing the Program Analyser [J].
Cadar, Cristian ;
Donaldson, Alastair F. .
2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C), 2016, :765-768
[10]  
Camacho NG., 2024, J Artif Intell Gen Sci (JAIGS), V3, P106