VeriDevOps Software Methodology: Security Verification and Validation for DevOps Practices

Eduard Paul Enoiu, Dragos Truscan, Sadovykh Andrey, Wissam Mallouli

Research output: Chapter in Book/Conference proceedingConference contributionScientificpeer-review

1 Citation (Scopus)
68 Downloads (Pure)

Abstract

VeriDevOps offers a methodology and a set of integrated mechanisms that significantly improve automation in DevOps to protect systems at operations time and prevent security issues at development time by (1) specifying security requirements, (2) generating trace monitors, (3) locating root causes of vulnerabilities, and (4) identifying security flaws in code and designs. This paper presents a methodology that enhances productivity and enables the continuous integration/delivery of trustworthy systems. We outline the methodology, its application to relevant scenarios, and offer recommendations for engineers and managers adopting the VeriDevOps approach. Practitioners applying the VeriDevOps methodology should include security modeling in the DevOps process, integrate security verification throughout all stages, utilize automated test generation tools for security requirements, and implement a comprehensive security monitoring system, with regular review and update procedures to maintain relevance and effectiveness.
Original languageEnglish
Title of host publicationARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
PublisherACM
Pages1-9
ISBN (Print)979-8-4007-0772-8
DOIs
Publication statusPublished - 2023
MoE publication typeA4 Article in a conference publication
EventARES 2023: The 18th International Conference on Availability, Reliability and Security -
Duration: 29 Aug 20231 Sept 2023

Conference

ConferenceARES 2023: The 18th International Conference on Availability, Reliability and Security
Period29/08/2301/09/23

Keywords

  • security
  • verification
  • DevOps
  • monitoring
  • testing

Fingerprint

Dive into the research topics of 'VeriDevOps Software Methodology: Security Verification and Validation for DevOps Practices'. Together they form a unique fingerprint.

Cite this