Toward successful DevSecOps in software development organizations: A decision-making framework

被引:48
作者
Akbar, Muhammad Azeem [1 ]
Smolander, Kari [1 ]
Mahmood, Sajjad [2 ,3 ]
Alsanad, Ahmed [4 ]
机构
[1] LUT Univ, Software Engn, Lappeenranta 53851, Finland
[2] King Fahd Univ Petr & Minerals, Informat & Comp Sci Dept, Dhahran, Saudi Arabia
[3] King Fahd Univ Petr & Minerals, Interdisciplinary Res Ctr Intelligent Secure Syst, Dhahran, Saudi Arabia
[4] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, STCs Artificial Intelligence Chair, Riyadh 11451, Saudi Arabia
关键词
DevOps; DevSecOps; Challenges; Multivocal literature review; Fuzzy analytical hierarchy process; FUZZY TOPSIS; SYSTEMATIC LITERATURE; PROCESS IMPROVEMENT; MANAGEMENT; DEVOPS; BARRIERS;
D O I
10.1016/j.infsof.2022.106894
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Development and Operations (DevOps) is a methodology that aims to establish collaboration between programmers and operators to automate the continuous delivery of new software to reduce the development life cycle and produce quality software. Development, Security, and Operations (DevSecOps) is developing the DevOps concept, which integrates security methods into a DevOps process. DevSecOps is a software development process where security is built in to ensure application confidentiality, integrity, and availability. Objective: This paper aims to identify and prioritize the challenges associated with implementing the DevSecOps process. Method: We performed a multivocal literature review (MLR) and conducted a questionnaire-based survey to identify challenges associated with DevSecOps-based projects. Moreover, interpretive structure modeling (ISM) was applied to study the relationships among the core categories of the challenges. Finally, we used the fuzzy technique for order preference by similarity to an ideal solution (TOPSIS) to prioritize the identified challenges associated with DevSecOps projects. Results: We identified 18 challenges for the DevSecOps process and mapped them to 10 core categories. The ISM results indicate that the "standards" category has the most decisive influence on the other nine core categories of the identified challenges. Moreover, the fuzzy TOPSIS indicates that "lack of secure coding standards," "lack of automated testing tools for security in DevOps," and "ignorance in static testing for security due to lack of knowledge" are the highest priority challenges for the DevSecOps paradigm. Conclusion: Organizations using DevOps should consider the identified challenges in developing secure software.
引用
收藏
页数:21
相关论文
共 78 条
[1]   Software test process improvement approaches: A systematic literature review and an industrial case study [J].
Afzal, Wasif ;
Alone, Snehal ;
Glocksien, Kerstin ;
Torkar, Richard .
JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 111 :1-33
[2]   A systematic review of search-based testing for non-functional system properties [J].
Afzal, Wasif ;
Torkar, Richard ;
Feldt, Robert .
INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (06) :957-976
[3]  
Agarwal A., 2017, Jindal Journal of Business Research, V6, P44
[4]  
Ahmed Zaheeruddin, 2019, 2019 International Conference on Digitization (ICD). Proceedings, P178, DOI 10.1109/ICD47981.2019.9105789
[5]   Success factors influencing requirements change management process in global software development [J].
Akbar, Muhammad Azeem ;
Sang, Jun ;
Nasrullah ;
Khan, Arif Ali ;
Mahmood, Sajjad ;
Qadri, Syed Furqan ;
Hu, Haibo ;
Xiang, Hong .
JOURNAL OF COMPUTER LANGUAGES, 2019, 51 :112-130
[6]   Statistical Analysis of the Effects of Heavyweight and Lightweight Methodologies on the Six-Pointed Star Model [J].
Akbar, Muhammad Azeem ;
Sang, Jun ;
Khan, Arif Ali ;
Fazal-E-Amin ;
Nasrullah ;
Hussain, Shahid ;
Sohail, Mohammad Khalid ;
Xiang, Hong ;
Cai, Bin .
IEEE ACCESS, 2018, 6 :8066-8079
[7]   Software outsourcing partnership model: An evaluation framework for vendor organizations [J].
Ali, Sikandar ;
Khan, Siffat Ullah .
JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 117 :402-425
[8]  
[Anonymous], 2013, STAT CONFIDENCE CONF
[9]  
[Anonymous], 2015, BUILDING SECURITY MA
[10]  
[Anonymous], GUIDELINES PERFORMIN