Lombardi et al., 2023 - Google Patents
From DevOps to DevSecOps is not enough. CyberDevOps: an extreme shifting-left architecture to bring cybersecurity within software security lifecycle pipelineLombardi et al., 2023
- Document ID
 - 3879269202566120764
 - Author
 - Lombardi F
 - Fanton A
 - Publication year
 - Publication venue
 - Software Quality Journal
 
External Links
Snippet
Software engineering is evolving quickly leading to an urgency to discover more efficient  development models. DevOps and its security-oriented extension DevSecOps promised to  speed up the development process while ensuring more robust code. However, many third … 
    Classifications
- 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
 - G06F21/577—Assessing vulnerabilities and evaluating computer system security
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
 - G06F21/562—Static detection
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F2221/2101—Auditing as a secondary aspect
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1433—Vulnerability analysis
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
 - H04L63/1416—Event detection, e.g. attack signature detection
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F11/00—Error detection; Error correction; Monitoring
 - G06F11/36—Preventing errors by testing or debugging software
 - G06F11/3668—Software testing
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F8/00—Arrangements for software engineering
 - G06F8/70—Software maintenance or management
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
 - H04L63/1425—Traffic logging, e.g. anomaly detection
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
 - G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F8/00—Arrangements for software engineering
 - G06F8/60—Software deployment
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1441—Countermeasures against malicious traffic
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
 - G06Q10/00—Administration; Management
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
 - G06Q30/00—Commerce, e.g. shopping or e-commerce
 - G06Q30/01—Customer relationship, e.g. warranty
 - G06Q30/018—Business or product certification or verification
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
 
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| Lombardi et al. | From DevOps to DevSecOps is not enough. CyberDevOps: an extreme shifting-left architecture to bring cybersecurity within software security lifecycle pipeline | |
| Islam et al. | A multi-vocal review of security orchestration | |
| US12126695B1 (en) | Enhancing security of a cloud deployment based on learnings from other cloud deployments | |
| Strom et al. | Mitre att&ck: Design and philosophy | |
| US12126643B1 (en) | Leveraging generative artificial intelligence (‘AI’) for securing a monitored deployment | |
| Koishybayev et al. | Characterizing the security of github {CI} workflows | |
| US12323449B1 (en) | Code analysis feedback loop for code created using generative artificial intelligence (‘AI’) | |
| Vu et al. | Bad snakes: Understanding and improving python package index malware scanning | |
| Elder et al. | A survey on software vulnerability exploitability assessment | |
| US20250039067A1 (en) | System and method for enterprise - wide data utilization tracking and risk reporting | |
| US12309185B1 (en) | Architecture for a generative artificial intelligence (AI)-enabled assistant | |
| Faruk et al. | Investigating novel approaches to defend software supply chain attacks | |
| Vu et al. | A benchmark comparison of python malware detection approaches | |
| Reichert et al. | Software supply chain security: a systematic literature review | |
| Householder et al. | Lessons learned in coordinated disclosure for artificial intelligence and machine learning systems | |
| Abo-Alian et al. | A data-driven approach to prioritize MITRE ATT&CK techniques for active directory adversary emulation | |
| Nelson et al. | Incident Response Recommendations and Considerations for Cybersecurity Risk Management | |
| Lin et al. | IRCopilot: Automated Incident Response with Large Language Models | |
| Friman | Agile and DevSecOps oriented vulnerability detection and mitigation on public cloud | |
| Ali et al. | Assessing of software security reliability: Dimensional security assurance techniques | |
| Shah et al. | Machine learning models for detecting software vulnerabilities | |
| Strom et al. | MITRE ATT and CK (trademark): design and philosophy | |
| Jawed | Continuous security in DevOps environment: Integrating automated security checks at each stage of continuous deployment pipeline | |
| McCoy | A relevance model for threat-centric ranking of cybersecurity vulnerabilities | |
| Chukwu | Leveraging the MITRE ATT&CK Framework to Enhance Organizations Cyberthreat Detection Procedures |