Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code Scripts

被引:6
作者
Bhuiyan, Farzana Ahamed [1 ]
Rahman, Akond [1 ]
机构
[1] Tennessee Technol Univ, Cookeville, TN 38505 USA
来源
2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2020) | 2020年
基金
美国国家科学基金会;
关键词
configuration script; co-location; devops; devsecops; empirical study; infrastructure as code; insecure coding pattern; puppet; security;
D O I
10.1145/3417113.3422154
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Insecure coding patterns (ICPs), such as hard-coded passwords can be inadvertently introduced in infrastructure as code (IaC) scripts, providing malicious users the opportunity to attack provisioned computing infrastructure. As performing code reviews is resource-intensive, a characterization of co-located ICPs, i.e., ICPs that occur together in a script can help practitioners to prioritize their review efforts and mitigate ICPs in IaC scripts. Objective: The goal of this paper is to help practitioners in prioritizing code review efforts for infrastructure as code (IaC) scripts by conducting an empirical study of co-located insecure coding patterns in IaC scripts. Methodology: We conduct an empirical study with 1613, 2764 and 2845 Puppet scripts respectively collected from three organizations namely, Mozilla, Openstack, and Wikimedia. We apply association rule mining to identify co-located ICPs in IaC scripts. Results: We observe 17.9%, 32.9%, and 26.7% of the scripts to include co-located ICPs respectively, for Mozilla, Openstack, and Wikimedia. The most frequent co-located ICP category is hard-coded secret and suspicious comment. Conclusion: Practitioners can prioritize code review efforts for IaC scripts by reviewing scripts that include co-located ICPs.
引用
收藏
页码:27 / 32
页数:6
相关论文
empty
未找到相关数据