CISC 640 Assignment 2: DevOps Security in Cloud Environments

Verified

Added on  2020/11/30

|4
|1017
|85
Report
AI Summary
This report examines the critical aspects of DevOps security within the context of distributed computing. It emphasizes the benefits of on-demand self-service, particularly in cloud environments, and how DevOps practices, such as "You build it, you run it," are reshaping software development and operation. The report highlights the increasing importance of security in light of growing reliance on software systems and the value of sensitive data. It delves into DevOps security cycles, emphasizing the use of infrastructure-as-code, automated testing, and the adoption of immutable virtual machines to enhance security. The report also discusses the cloud-specific attributes, building components, and roles of cloud actors in establishing a secure environment, including risk assessment, treatment, and control. The conclusion reflects on the challenges and opportunities that DevOps presents for software security, advocating for a metrics-based approach to improve security in agile environments, and the need for further research. References include key publications on software security and measurement.
Document Page
Professional Expression Assignment 2 CISC 640
1. INTRODUCTION
Distributed computing carries with it numerous favorable circumstances, however on-
request self assistance is may be the most critical for framework engineers, PC assets can be sent
and scaled all over from web-open dashboards surprisingly fast. This thus has made ready for
Dev-Ops: another world view in creating and working programming frameworks, in some cases
dense to the expression "You fabricate it, you run it"
The turn of events, organization and activity of programming are extraordinary; it can't
be rejected that security penetrates are going on surrounding us. Programming frameworks have
created to the point that we utilize and rely on them every day similarly that we rely on
customary foundations and utilities, for example, force, transportation and media transmission.
The estimation of delicate data in PC frameworks is continually expanding, and the equivalent
can be said for the comparing dangers, however measures to diminish the subsequent weakness
are not created at a similar movement. The results of this absence of interest in programming
security can be disastrous.
2. DEVOPS SECURITY
DevOps cycles would appear to can possibly fundamentally improve security safeguards. In the
event that application structure and climate are spoken to in framework as-code, at that point
hypothetically that code can be examined, tried and overseen similarly as is source code. There is
a diminished possibility of security weaknesses presented through basic manual mistake.
Whenever computerized security tests are accessible, these can be performed simultaneously in
copied test conditions that are destined to be fundamentally the same as the creation climate. The
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
DevOps preferences are
significantly upgraded if the
association embraces the act of
utilizing fleeting unchanging
virtual machines. With this
training the entire Application
might be reproduced at regular intervals or somewhere in the vicinity. There is no manual
security fixing of creation machines; rather each new form can begin from a cutting-edge picture
lodging the most recent fixed working framework and middleware. Virtual machines are
"completely prepared" and never kept up so a malevolent or reckless representative can't plant
malware in the creation climate without experiencing the manufacture endorsement measure.
The vital components for the effective appropriation of a DevOps approach especially
appropriate for the cloud are the designer association's comprehension of the (a) cloud-explicit
attributes impacting the product improvement, (b) The building parts for each cloud
administration type and sending model, (c) Along with each cloud entertainer's exact function in
organizing a safe environment. The cloud client's trust in tolerating the danger from utilizing
cloud administrations relies upon how much trust they place in the elements arranging (and
creating) the cloud biological system.
The danger the executives cycle guarantees that issues are distinguished and alleviated right
off the bat in the advancement cycle and followed by occasional audits adjusted to the deft
DevOps vision. As cloud clients and the other cloud entertainers associated with safely
organizing a cloud biological system have changing levels of authority over cloud-based IT
Document Page
assets (counting programming segments), they have to share the duty of executing and checking
the security prerequisites. Cloud entertainers additionally need to evaluate the right usage and
constantly screen all recognized security controls which will turn out to be important for the
cloud administration to create. The methodology appeared in above Figure is a consistently
executed cycle made out of a bunch of composed exercises for administering and controlling
dangers during the DevOps life-cycle. This arrangement of exercises comprises of the
accompanying assignments:
Risk Assessment
Risk Treatment
Risk Control
A danger based way to deal with DevOps
for cloud administrations is an all
encompassing action that ought to be
incorporated into each part of the engineer association, from arranging and framework
improvement life cycle measures (Steps 1 – 2 in Figure)to security controls/measurements
allotment (Steps 3 – 5). The subsequent arrangement of security controls (standard, custom-made
controls, controls acquired from suppliers and under client's immediate execution and the board)
lead slowly to the production of the security measurements in Step 5. Inspired measurements can
be checked during the life-pattern of the cloud administration to empower the lithe (and secure)
cycles as needed by DevOps.
Document Page
3. CONCLUSION
DevOps speaks to both a test and an open door for programming security. Obviously the capacity
to roll out speedy improvements will shrivel the open door for aggressors once security weakness
has been found, and yet it must be recognized that fast deliveries are not generally helpful for
careful testing plans. We have proposed a measurements based way to deal with improve
DevOps security, yet further experimental exploration is important to build up how DevOps and
programming security can be accommodated.
(Martin Gilje Jaatun, 2017)
4. REFERENCES
1. Barry Boehm and Victor R Basili. 2005. Software defect reduction top 10 list. In
Foundations of empirical software engineering: the legacy of Victor R. Basili. Vol. 426.
2. Boyle K., et.al. 2010. The CIS security metrics. Technical Report TR-28. Center for Internet
Security. http://benchmarks.cisecurity. org/
3. Martin Gilje Jaatun. 2012. Hunting for Aardvarks: Can Software Security Be Measured? In
Multidisciplinary Research and Practice for Information Systems, Gerald Quirchmayr, Josef
Basl, Ilsun You, Lida Xu, and Edgar Weippl (Eds.). Lecture Notes in Computer Science,
Vol. 7465. Springer Berlin Heidelberg, 85–92. https://doi.org/10.1007/978-3-642-32498-7_7
4. Trimintzios, P. 2011. Measurement Frameworks and Metrics for Resilient Networks and
Services. Discussion Draft. European Network and Information Security Agency. (2011).
5. Gary McGraw. 2006. Software Security: Building Security In. Addison-Wesley.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]