Exploring Security Practices in Infrastructure as Code: An Empirical Study

08/07/2023
by   Alexandre Verdet, et al.
0

Cloud computing has become popular thanks to the widespread use of Infrastructure as Code (IaC) tools, allowing the community to conveniently manage and configure cloud infrastructure using scripts. However, the scripting process itself does not automatically prevent practitioners from introducing misconfigurations, vulnerabilities, or privacy risks. As a result, ensuring security relies on practitioners understanding and the adoption of explicit policies, guidelines, or best practices. In order to understand how practitioners deal with this problem, in this work, we perform an empirical study analyzing the adoption of IaC scripted security best practices. First, we select and categorize widely recognized Terraform security practices promulgated in the industry for popular cloud providers such as AWS, Azure, and Google Cloud. Next, we assess the adoption of these practices by each cloud provider, analyzing a sample of 812 open-source projects hosted on GitHub. For that, we scan each project configuration files, looking for policy implementation through static analysis (checkov). Additionally, we investigate GitHub measures that might be correlated with adopting these best practices. The category Access policy emerges as the most widely adopted in all providers, while Encryption in rest are the most neglected policies. Regarding GitHub measures correlated with best practice adoption, we observe a positive, strong correlation between a repository number of stars and adopting practices in its cloud infrastructure. Based on our findings, we provide guidelines for cloud practitioners to limit infrastructure vulnerability and discuss further aspects associated with policies that have yet to be extensively embraced within the industry.

READ FULL TEXT

page 9

page 17

page 20

page 21

page 22

page 35

page 37

page 38

research
07/16/2019

Security Smells in Infrastructure as Code Scripts

Context: Security smells are coding patterns in source code that are ind...
research
05/25/2023

An Empirical Study on Workflows and Security Policies in Popular GitHub Repositories

In open-source projects, anyone can contribute, so it is important to ha...
research
07/30/2019

An Empirical Study of GraphQL Schemas

GraphQL is a query language for APIs and a runtime to execute queries. U...
research
06/27/2020

XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices

Kubernetes is an open-source software for automating management of compu...
research
05/15/2019

Towards a Security Baseline for IaaS-Cloud Back-Ends in Industry 4.0

The popularity of cloud based Infrastructure-as-a- Service (IaaS) soluti...
research
08/11/2022

Achievement Unlocked: A Case Study on Gamifying DevOps Practices in Industry

Gamification is the use of game elements such as points, leaderboards, a...
research
06/14/2021

No Free Lunch: Microservice Practices Reconsidered in Industry

Microservice architecture advocates a number of technologies and practic...

Please sign up or login with your details

Forgot password? Click here to reset