Cloud Computing
Cloud Computing
Index Terms
DevSecOps, Security Automation, Cloud Environments, Cloud-Native Applications, Development Lifecycle, Shifting Left,
Vulnerability Detection, Collaboration, Infrastructure as Code (IaC), Operations, Security Teams, Continuous Integration, Threat
Modeling, Secure Coding Practices, Compliance as Code, Container Security, Continuous Deployment, Microservices Architecture,
Automated Testing, Configuration Management,
ACRONYMS
AT Automated Testing
C Collaboration
CAC Compliance as Code
CC Cloud Computing
CD Continuous Deployment
CI Continuous Integration
CM Configuration Management
CNA Cloud-Native Applications
CS Container Security
DL Development Lifecycles
DSO DevSecOpss
IAC Infrastructure as Code (IaC)
MA Microservices Architecture
O Operations
SA Security Automation
SCP Secure Coding Practices
SL Shifting Left
ST Security Teams
TM Threat Modelings
VD Vulnerability Detection
DevSecOpss (DSO), Security Automation (SA), Cloud Computing (CC), Cloud-Native Applications (CNA), Development
Lifecycles (DL), Shifting Left (SL), Vulnerability Detection (VD), Collaboration (C), Continuous Deployment (CD), Operations
(O), Security Teams (ST), Infrastructure as Code (IaC) (IAC), Threat Modelings (TM), Secure Coding Practices (SCP),
Compliance as Code (CAC), Container Security (CS), Continuous Integration (CI), Microservices Architecture (MA),
Automated Testing (AT), Configuration Management (CM).
I. I NTRODUCTION
Strong security protocols are crucial in the ever-changing world of cloud computing, where scalability, dependability, and
innovation are prioritized. Deploying security automation technologies in cloud settings becomes imperative as more and more
enterprises turn to cloud-native architectures to meet their computing needs. This paper examines how DevSecOps principles are
applied in cloud environments, emphasizing how cloud-native security automation supports modern computing infrastructures’
primary goals of scalability, stability, and innovation.
Besides the fact that cloud computing technology has cleared the way for the acceptance of cloud-native architectures,
including microservices, containers, and serverless processing, all these changes mean that traditional monolithic software
will gradually lose its importance. The phrase ”in this context” suggests that DevSecOps plays a vital role in the security
environment, which in this case is cloud computing. The cloud-native security automation plays a compatible role with the
cloud development and deployment phases system, and they easily interact with each other, thus allowing companies to integrate
security features at every stage of the project flow. Cloud computing in combination with cloud-native security automation
demonstrates the need for ensuring that technical development is in step with the resilient security guidelines within which
today’s digital ecosystem thrives.
C. Challenges and Opportunities
In addition, the development of cloud computing has made it easier for cloud-native designs, which are defined by serverless
computing, microservices, and containers. The application of DevSecOps ideas to cloud systems has become more and more
relevant in this context. By integrating easily with cloud computing paradigms, cloud-native security automation enables
enterprises to incorporate security controls at every level of the development and deployment lifecycle. The correlation between
cloud computing and cloud-native security automation highlights the significance of coordinating technological progress with
strong security protocols in the contemporary digital environment.
D. Research Objectives and Contributions
This research paper aims to delve into implementing cloud-native security automation, specifically focusing on integrating
DevSecOps principles within cloud environments. The primary objectives of this research are to:
• Explore the theoretical foundations and practical challenges of implementing DevSecOps in cloud environments.
• Develop strategies to integrate security automation tools and practices into cloud-native architectures seamlessly.
• Conduct empirical evaluations to assess the efficacy and scalability of DevSecOps implementations in real-world cloud
environments.
• Provide actionable insights and recommendations for organizations seeking to strengthen their security posture through
the adoption of cloud-native security automation practices.
Got it! Here’s the revised version of the tables with the provided data:
E. Literature Survey
TABLE I. literature review table
II. BACKGROUND
Cloud computing has completely changed how businesses access and use computer resources. It provides an internet-based
on-demand delivery mechanism for IT services (also known as ”the cloud”). Physical infrastructure is no longer required,
which has major benefits in terms of scalability, flexibility, and cost-effectiveness. Here, we examine the core ideas of cloud
computing, examining its different service and deployment patterns and emphasizing its main advantages.
A. Introduction
Since it provides on-demand online access to computer resources including servers, storage, databases, and software, cloud
computing has emerged as a key component of contemporary IT infrastructure [1]. Because of this paradigm change, enterprises
no longer need to maintain their physical infrastructure, which has major benefits in terms of cost-efficiency, scalability, and
flexibility.
In this section, cloud computing is introduced and its basic concepts—such as deployment models (public, private, hybrid)
and service models (IaaS, PaaS, and SaaS)—are explored. We’ll also go over the main advantages cloud computing provides
for businesses.
B. Service Model
Infrastructure as a Service (IaaS): The capability of virtualizing hardware into servers, storage, and networking platforms
is the basis for Infrastructure as Service (IaaS) at its fundamental. The users tightly control everything by the OS and software
that installed on the cloud servers.
Platform as a Service (PaaS): PaaS provides more comprehensive functionalities for building, deploying, and managing
applications by abstracting IaaS lower-level functionalities and constructs. Such as PaaS, users are only required to work on
application development and deployment, while their complexity, the service provider becomes the one who handles these vital
infrastructure components. [1].
Software as a Service (SaaS): With PaaS, the range of services is expanded from IaaS to an environment for the creation of
apps, deployment provisioning, and other applications management. The PaaS lower level users’ worries which enables them
to devote directly to application development and deployment excluding the tasks of managing infrastructure elements from
their responsibilities. [1].
C. Deployment Models
Public Cloud: Third-party vendors offer public cloud services over the open internet. Well-known for their exceptional
cost-effectiveness and scalability, these services offer maximum flexibility in meeting a wide range of requirements. But they
might raise concerns about data security, especially when dealing with private data. [1].
Private Cloud: Customized cloud environments that are carefully designed and managed exclusively for one company
are known as private clouds. This unique configuration guarantees previously unheard-of security and governance, giving the
company total control over its cloud resources. However, there is always a greater financial cost associated with this increased
degree of personalization and security. [1].
Hybrid Cloud: By combining the best features of public and private cloud infrastructures, hybrid clouds provide businesses
with an adaptable solution that maximizes public cloud flexibility and cost-effectiveness while securing critical data on
private cloud servers. With the help of this strategy, enterprises can balance using the public cloud’s enormous resources
with maintaining control over vital data assets. [1].
D. Benefits of Cloud Computing
Scalability: Unmatched scalability is provided by cloud resources, which allow capacity to be easily adjusted to meet
changing demand without requiring an initial investment in physical infrastructure. Because of its dynamic scalability, enterprises
can optimize cost-effectiveness and operational efficiency by allocating resources efficiently in line with current requirements.
[1].
Flexibility: With cloud computing, customers can access a wide range of computing resources without restriction, right
when they need them. This allows for more flexibility and responsiveness while handling changing business needs. With this
on-demand availability, businesses can quickly adjust to changing conditions, which improves operational effectiveness and
competitiveness in the fast-paced business environment of today buyya2010cloud.
Cost-Efficiency: With cloud services, customers just pay for the resources they use, negating the need for up-front software
and hardware purchases. By precisely matching costs to consumption, this pay-as-you-go model not only removes financial
obstacles to admission but also enables enterprises to realize significant cost savings. As a result, businesses can maximize
their IT expenditures and reallocate funds to strategic projects, which promotes development and innovation. [3].
Accessibility: Because cloud resources can be accessed by anyone with an internet connection, they enable remote workers
and promote seamless collaboration across all geographic boundaries. Employees can work from anywhere thanks to this
widespread accessibility, which promotes increased output, flexibility, and work-life balance. Furthermore, effective teamwork
and information sharing are encouraged by real-time access to shared documents and collaborative tools, which spurs innovation
and organizational success. [10].
Organizations can use cloud computing to achieve their business goals by using this transformational technology wisely
if they understand the underlying principles of service and deployment models and the many advantages it offers. With this
knowledge, enterprises may more effectively utilize cloud resources, increase operational effectiveness, foster innovation, and
ultimately position themselves for success in the rapidly changing digital landscape.
III. R ISE OF C LOUD -NATIVE A RCHITECTURES
The development and deployment of apps have undergone a significant transformation since the advent of cloud computing.
Cloud-native architectures, which are created especially to take advantage of cloud settings, have replaced traditional monolithic
designs, in which every functionality is combined into a single codebase. Three main components—serverless computing,
containers, and microservices—define these designs.
A. Evolution of Cloud-Native Architectures
The inception of Service-Oriented Architecture (SOA) in the early 2000s is credited with giving rise to the concept of
microservices [5]. However, because of their cumbersome protocols and standards, earlier SOA implementations frequently
struggled with complexity. The emergence of cloud computing provided a favorable environment for the spread of microservices
architecture. Microservices were able to become seamlessly integrated into the cloud environment by making use of the on-
demand nature of cloud resources and the capacity to grow services autonomously. This symbiotic relationship encouraged
innovation and agility. [6].
Containers appeared at the same time as microservices, providing a way to package and isolate individual services from
their dependencies. Apps can now be packaged more consistently so they work well across a range of scenarios and on any
OS system thanks to containerization technologies, which are led by Docker [?]. This method simplifies workflows for testing,
deployment, and development.
The most recent advancement in cloud-native technology is serverless computing. It frees developers from the complexities
of server and infrastructure maintenance so they may focus entirely on building code. Cloud providers automatically handle
tasks like server provisioning, resource management, and scaling [8]. This paradigm change promotes quick innovation by
drastically reducing operational overhead and speeding up application deployment.
B. Benefits of Cloud-Native Architectures
• Enhanced Productivity: Development teams can work in more compact, nimble groups that concentrate on certain
microservices. Compared to monolithic codebases, this enables quicker development cycles and easier maintenance [5].
• Enhanced Scalability: Cloud-native Applications make use of the natural scalability of cloud resources. According to their
unique requirements, each microservice can be scaled individually, maximizing resource usage [6].
• Enhanced Resilience: Cloud-native apps are more resilient to failures because of their modular architecture. Problems
with one microservice don’t affect other microservices much, so overall application availability and fault tolerance are
improved. Jackson, 2016 [?].
• Faster Deployments: Compared to traditional monolithic techniques, containerization and automation inside DevSecOps
pipelines provide faster and more frequent deployments [8].
Cloud-native architectures leverage these benefits to enable businesses to create and implement applications more effectively
and efficiently, and to respond more quickly and agilely to changing business needs. This innovative strategy not only quickens
the rate of innovation but also encourages scalability and resilience, setting up businesses for success in the fast-paced, cutthroat
market of today.
IV. I MPORTANCE OF S ECURITY IN C LOUD E NVIRONMENTS
While cloud computing can offer some impressive benefits, like cost and flexibility, it also brings with it certain new security
risks that businesses need to be aware of. An overview of these issues is provided here, along with the vital significance of
putting strong security measures in place.
A. Security Challenges in Cloud Environments
• Data Breaches: Cloud infrastructures are vulnerable to cyberattacks because they house sensitive data. These hacks may
be the result of insider threats, unsecured setups, or application flaws. [9].
• Unauthorized Access: Unauthorized users may be able to access sensitive information or cloud resource functionality
due to inadequate access controls. This may result in service interruption, data theft, or manipulation. [10].
• Compliance Issues: Depending on their location and sector, organizations must abide by different laws about data security
and privacy. The configuration of cloud deployments must adhere to these compliance standards, which might be intricate.
[11].
• Shared Responsibility Models: In cloud environments, security implementation follows the shared responsibility model.
It is the responsibility of organizations to safeguard their applications and data deployed in the cloud, whereas cloud
service providers are accountable for securing the foundational infrastructure [12]. Effective communication between the
entity and the cloud vendor is essential due to the possibility of misinterpretations arising from this allocation of duties.
B. Importance of Robust Security Measures
When businesses take preventative action, cloud computing can offer a secure environment despite these difficulties. Adopting
strong security procedures is essential for safeguarding private data and guaranteeing the availability and integrity of cloud-based
services:
• Strong Access Controls: Analyzing and regulating who should be able to access particular data is called granular access
control which is the implementation of rules and principles to regulate the people who got permission to download a
specific informative data within a cloud-based system. The likelihood of successful into into users systems is slim with the
implementation of Multi-factor authentication (MFA) which requires users to provide several modes of validation such as
passwords and a a unique code meant from their personal devices. Least privilege principle practices means allowing users
to access only that level of necessary access required to their job purposes to ensure that there is minimal unauthorized
intrusion.
• Data Encryption: Encoding is transforming data in the away, which cannot be decoded without appropriate decryption
key. As data either gets transmitted across the network, or at rest on disk or database, it can be encrypted. Encryption of
the information will thus render the data incomprehensible and the attacker unable to decipher and use it regardless of
whether he/she has infiltrated the system unlawfully.
• Regular Security Assessments: Besides, vulnerability assessments are performed on apps and cloud infrastructures for the
well-known security vulnerabilities issue. The process of examining fake attempts by breaking into the internet applications
and discovering security barriers is known as Ethical hacking and sometimes as Penetration testing. These evaluations,
when done in a regular basis, allow the organizations a head start where they can bug out and plug the security issues
before attackers can use them.
• Incident Response Plan: While an Incident Response Plan should reveal the course of action in case of an incident
or a data breach, it will also determine the roadmap for the management of the event. Stipulated in the regime are the
procedures for detection, assessment, containment, clearing, and revival from security accidents. A company that has an
incident response plan, well-written, only a few, will be able to minimize the disruption to its operations and reputation,
due to the fact that it will react to breaking security in an effective and fast way.
• Security Awareness Training: Though the human element is one of the weakest security links within an organization,
employees are the key driver of cybersecurity practices. Those employees who are trained in security awareness can
identify and effectively react to scenarios of credible and phishing that may result in security breaches. Through the
encouragement of awareness and the development of a security conscious culture organizations might transform the actual
chances of human error being the penetration of their system by a security incident
Organizations may confidently utilize the advantages of cloud computing by prioritizing security and putting these precautions
in place, knowing that their data and apps are secure.
A. Defining DevSecOps
The acronym for Development, Security, and Operations is DevSecOps. The division of labor between the development,
security, and operations teams is accomplished through a culture shift. Security testing has historically been done later in the
development cycle, which can cause delays and rework. By automating security testing throughout the development pipeline,
enabling faster feedback loops [21], integrating security considerations from the outset of the process (”Shift Left Security”)
[20], and promoting a shared responsibility for security across all development teams [22], DevSecOps seeks to close this gap.
• Infrastructure as Code (IaC) Security: Utilize Infrastructure as Code (IaC) templates and adhere to security best
practices. Integrate security checks into the deployment process to guarantee that security configurations are the same in
all environments.
• Continuous Monitoring: Establish real-time, continuous monitoring of the infrastructure and apps. Utilize tools such as
alerting, monitoring, and logging to quickly identify and address security incidents. [24].
• Incident Response Automation: Create automated incident response procedures to quickly handle security events. This
could entail utilizing automation tools like scripts or orchestration platforms and writing playbooks for typical security
scenarios.
• Secure DevOps Toolchain: Verify the security of the DevOps toolchain’s tools. To find and fix vulnerabilities in the tools
themselves, perform security audits, and update and patch tools regularly [25].
• Secure Code Reviews:Incorporate security concerns when reviewing code. Peer evaluations ought to cover potential
vulnerabilities as well as security best practices and functional requirements.
• Training and Awareness: For the development, operations, and security teams, offer continuing education and awareness
campaigns. By doing this, team members are guaranteed to be up to date on the newest security risks, best practices, and
technologies. [26].
• Compliance as Code: Integrate regulatory compliance checks within the CI/CD pipeline to guarantee that apps follow
the rules. This aids in keeping an auditable record and automating compliance inspections.
• Continuous Improvement: Review and enhance security procedures regularly in light of user input, events, and lessons
gained. To keep ahead of changing security threats, promote a culture of continual development.
• Shift Left Security: Security considerations are frequently addressed towards the end of the software development lifecycle,
if they are addressed at all, in conventional methods. Security is shifted earlier in the process with DevSecOps, which is
why ”Shift Left” is used. This entails starting the development process as early as possible—ideally during the planning
and design phases—by incorporating security testing and vulnerability assessment. Teams can reduce the risk of expensive
rework and security breaches later in the process by doing this since they can discover and address security issues earlier.
• Automation: A fundamental component of DevSecOps is automation. Through the automation of repetitive security
operations, including penetration testing, vulnerability scanning, and code analysis, teams may improve efficiency and
react faster to security threats. In addition to guaranteeing consistency and reproducibility in security testing, automation
lowers the possibility of human error.
• Collaboration: Collaboration between the development, security, and operations teams is emphasized by DevSecOps.
These teams collaborate to create and maintain secure apps rather than working alone. Teams can respond to security
threats more successfully when they can share knowledge and expertise more easily, which is made possible by
• Continuous Monitoring: In DevSecOps, security monitoring is a continuous process rather than an isolated incident.
Actively keeping an eye out for potential security flaws and threats in infrastructure and apps is known as continuous
monitoring. Teams can reduce the impact of any breaches by swiftly identifying and responding to security problems
when they are continuously monitoring their environments.
Fig. 2. DevSecOps
C. Security-by-Design
1) Security Requirements Definition: To inform design choices, coding procedures, and testing approaches, it is essential
to precisely identify security needs throughout the planning stage. This entails determining pertinent compliance
requirements, security risks, and vulnerabilities for the project. Development teams should prioritize security con-
siderations throughout the software development lifecycle by setting explicit security objectives and limits up front.
By taking a proactive stance, security is guaranteed to be considered throughout the whole application development
and implementation process, as opposed to being an afterthought. An early definition of security criteria also aids in
coordinating expectations among stakeholders and promotes communication among various development process teams.
[32].
2) Secure Coding Practices: It’s crucial to teach developers to secure coding techniques, use code analysis tools to enforce
coding standards, and spot possible security vulnerabilities early in the development process to improve security posture.
Organizations can lessen the chance of introducing security flaws and minimize common vulnerabilities by providing
developers with the knowledge and skills they need to produce secure code. Code analysis tool integration also makes
it possible to automatically verify that security best practices are followed and to find potential vulnerabilities in the
codebase. By taking a proactive stance, development teams can address security risks before they become serious problems
and promote a culture of security accountability. [32].
3) Threat Modeling: To proactively identify potential attack routes and vulnerabilities and ensure the construction of a more
resilient application, threat modeling activities are necessary. Early in the development lifecycle, businesses can anticipate
and reduce security issues by methodically assessing the system’s architecture, components, and potential threats. Teams
can concentrate resources on tackling the most pressing issues by using threat modeling to assist in prioritizing security
initiatives. Additionally, it makes it easier to make well-informed decisions about security controls and countermeasures,
which results in the deployment of more effective security measures. All things considered, threat modeling incorporated
into the development process improves the security posture of the application and lowers the probability of successful
intrusions. [32].
D. Security Checklists
1) Pre-commit Checks: Before code is committed, it is possible to scan for vulnerabilities, secrets, or coding style infractions
by integrating checks into version control systems. Potential security flaws and coding errors can be found and fixed early
in the development process by integrating automated checks into the workflow. This lowers the possibility of adding
vulnerabilities to the codebase. This proactive strategy improves the software’s overall security posture and fosters a
culture of continuous improvement by helping to maintain code quality and security standards. [33].
2) Stage-specific Checks: The Software Security Lifecycle Guide has also been made available to organizations which a
tailored list of procedures that the vendors or developers assist in implementing during each stage of the lifecycle. Security
teams may evaluate the secure status of their technology platforms and applications periodically with the objective of
defining specific security conditions and standards for each phase. As a result, such lists play the role of recognizing and
correcting the potential security vulnerabilities and risks on the earliest stage of the development process thus proving
to be essential in ensuring reliability and redundancy of developed software systems. Finally, the procedures should not
only be checked regularly but also improved frequently to enable organizations to even enhance their climate prevailing
by the evolving best practices and threats. [33].
3) Post-deployment Checks: A strong security posture requires routinely checking deployed apps for vulnerabilities that
might have been overlooked earlier in the process. Even with extensive testing done during development, vulnerabilities
could still exist or be hidden. Organizations can quickly discover and address any security vulnerabilities by regularly
conducting security assessments after deployment. By strengthening the application’s overall security and mitigating
potential threats, this proactive strategy lowers the possibility of successful intrusions. Furthermore, post-deployment
assessment input can be integrated into the development process to facilitate ongoing improvement and increase the
efficacy of subsequent security measures. [33].
E. Balancing Speed and Security
1) Shift Left Security: Finding and fixing vulnerabilities quickly depends on integrating security tests as early in the
pipeline as feasible. By moving security assessments later in the development process to the left, possible problems can
be identified early on and fixed, reducing the chance that security lapses would spread to other phases of the process.
This proactive strategy improves the application’s overall security posture while also cutting down on the time and effort
needed for cleanup. Early detection increases the software’s resistance to possible threats by allowing developers to more
effectively apply security measures. [27].
2) Prioritization: Ensuring security and productivity requires concentrating on fixing important vulnerabilities quickly
without slowing down the development process. Development teams are better able to prioritize resources by addressing
high-impact security vulnerabilities first, thereby mitigating the most urgent threats. By ensuring that major vulnerabilities
are quickly found, evaluated, and fixed, this method lowers the possibility of exploitation and possible harm to the program.
To ensure that remediation actions are carried out in a way that least interferes with continuing development activities,
it is imperative to establish a balance between security and development velocity. [27].
3) Automation: In DevSecOps pipelines, automating security processes is critical to maximizing resource utilization and
expediting the deployment process. Organizations may effectively carry out routine security checks, such as vulnerability
scanning and configuration management, without the need for human intervention by utilizing automation. By doing this,
secure software is delivered more quickly and development staff are freed up to work on more strategic projects and
manual reviews, where human knowledge is essential. Furthermore, automation lowers the possibility of human error and
improves overall security posture by ensuring consistency and dependability in security procedures across the pipeline.
[27].
Organizations can create a strong DevSecOps framework that improves efficiency and security in the software development
process by customizing the DevSecOps pipeline to meet their unique needs, integrating the right security tools, encouraging a
culture of security-by-design, and striking a balance between speed and security considerations.
VIII. D EV S EC O PS B EST P RACTICES IN AWS: S ECURING YOUR C LOUD E NVIRONMENT
In addition to the integration of security in the DevOps process, which is the essence of DevSecOps in AWS, other operational
tasks are automated and supported by machine learning. This is the means through which secure and compliant application
change gets offered for an unbelievable duration. The DevSecOps pipeline includes the entire stack of continuous routines
dedicated to integration, delivery, deployment, testing, logging, monitoring, auditing, and governance. The AWS offers platforms
and tools for the security of software during development and revenue reporting of discovered issues in a single view. The
reference architecture starts with SCA to determine vulnerabilities, SAST to detect the threats, DAST to uncover external risks
and pipeline piracy prevention.
The DevSecOps pipeline on AWS utilizes a combination of AWS services and third-party tools for its operations.
• CI/CD services: The platforms that I will be using are CodeBuild, CodeCommit, CodeDeploy, CodePipeline, Lambda,
SNS, S3, and Parameter Store.
• Continuous testing tools: OWASP Dependency-Check, Sprox, PHPStan, and OHUAP Zap ©
• Continuous logging and monitoring services: Events from CloudTrail are stored in CloudWatch Logs, and can be subscribed
to with CloudWatch Events.
• Auditing and governance services: CloudTrail, TCP/IP, and CSAA offer additional security tools.
• Operations services: Security Hub, Cloudformation, Parameter store, Elastic Beanstalk
5) If no weaknesses are detected, the CodeDeploy package will be sent to the staging environment for deployment.
6) Subsequently, CodeBuild performs Dynamic Application Security Testing (DAST) by utilizing the open-source software
Apache ZAP. Furthermore, this particular stage is completely compatible with a Bring Your Tool (BYOT) strategy.
7) When vulnerabilities are detected while conducting DAST scanning, CodeBuild initiates the Lambda function, which
then shares the findings with the Security Hub and saves them in the identical S3 bucket that was utilized previously.
8) If there are no noteworthy vulnerabilities present, the pipeline will advance to the stage of approval. A notification via
email is dispatched to the designated approver for necessary actions.
9) Upon authorization, the CodeDeploy tool initiates the deployment process, transferring the code to the operational Elastic
Beanstalk setting.
10) CloudWatch Events monitors transitions in states across the pipeline and informs subscribed individuals through SNS
notifications.
11) CloudTrail observes API invocations and issues alerts for crucial events occurring in the pipeline and CodeBuild
undertakings, thereby assisting in the oversight of auditing procedures.
12) AWS Config monitors modifications in the configurations of various AWS services. Particular regulations within AWS
Config are integrated into the workflow to uphold security standards, for instance, validating the existence of specific
environmental parameters and activating file authentication for CloudTrail records.
13) Security measures encompass the utilization of iam roles and s3 bucket policies to limit entry to pipeline resources,
encryption of data both at rest and in transit, and the employment of a Parameter Store for the storage of confidential
information. Further security upgrades might be required to adhere to standards such as FedRAMP, which could involve
the implementation of Multi-Factor Authentication (MFA).
The security of the system is guaranteed through the implementation of an access control policy and the assignment of roles
for Identity and Access Management (IAM) which govern the permissions granted to various pipeline resources. Data within
the pipeline is considered highly valuable due to the sensitive nature of the information it contains, leading to a consistent
encryption process and secure transportation via the SSL network. Sensitive information such as confidential variables is
securely stored in a Parameter store, which serves a similar function to API keys and passwords. To align with established
frameworks like FedRAMP, consideration should be given to the potential implementation of Multi-Factor Authentication
(MFA).
Security measures are integrated into the pipeline through the execution of Source Code Analysis (SCA), Static Application
Security Testing (SAST), and Dynamic Application Security Testing (DAST) assessments. Conversely, the pipeline can utilize
Interactive Application Security Testing (IAST) methodologies, which aim to combine the preceding phases of SAST and
DAST.
B. Deploying the Pipeline
Security measures are integrated into the pipeline through Source Code Analysis (SCA), Static Application Security Testing
(SAST), and Dynamic Application Security Testing (DAST) evaluations. Conversely, pipelining may leverage IAST methods,
designed to amalgamate the prior findings of SAST and DAST.
C. Running the Pipeline
To initiate the pipeline, follow these steps:
1) Apply changes to your actual repositories containing your application code. This action triggers a CloudWatch event,
initiating the workflow.
2) CodeBuild detects the code for specific vulnerabilities during the build process.
3) If any vulnerabilities are found, a Lambda function parses the output results and posts the vulnerability-finding information
to the Security Hub.
D. SCA and SAST Scanning
At the same moment, the practical approach is implemented to initiate SCA (Software Composition Analysis) and SAST
(Static Application Security Testing) scans concurrently in CodeBuild. After this, scanning activities involve the utilization of
OWASP Dependency-Check, SonarQube, and PHPStan tools.
It is the case that SCA can be used to detect vulnerabilities but OWASP Dependency-Check is specifically recommended
because of its extensive range of coverage.
The code excerpt provided demonstrates the utilization of a lambda function for implementing the parsing of SCA analysis
results and the sequencing of Security Hub integration. Symptom reduction and severity level assignment are carried out by
the criteria sanctioned by the Security Hub.
=
Fig. 5. ”report generated by owasp Dependency-check scan.”
G. DAST Scanning
When our architecture includes CodeBuild, the DAST (Dynamic Application Security Testing) tool begins scanning and
subsequently passes the scan results to third-party applications.
If SAST reveals no vulnerabilities in the pipeline, the process proceeds to the approval stage, where an email notification
is sent to the approver. The approver can then review the proposal and decide whether to proceed with the deployment. Upon
approval, the application is deployed to the specified environment in Elastic Beanstalk.
Following the completion of CodeBuild, the DAST scanning process begins. This involves running scans to detect any
security issues. Similar to SAST, a Lambda function is employed to handle the scanning results. The Lambda function then
posts the results to the Security Hub. Below is an example Lambda function code snippet:
Titus became a runtime deployment system as well as an automated batch job scheduling system. It supported Netflix in
implementing batch jobs for multiple operations.
• Batch users might also combine components of the infrastructure and run large workloads across multiple instances swiftly.
Instruction users could immediately develop local code and scale it on Titus for execution.
• After batch, Titus service users also got to experience the simplicity of resource management and provided test
environments like production one by themselves.
• This time, the developers can make the applications reusable along with making possible the faster development of new
versions of applications.
Eventually, operators were able to achieve Titus installations in one to two minutes whereas earlier timings were tens of
minutes. Hence, the users will perform locally the trial runs as well as the tests just like the users used to previously with
batch and service customers who had greater confidence before.
“The theme that underlies all these improvements is developer innovation velocity.” - Netflix tech blog
The container provided speed and the flexibility to deliver customized features quickly which highly contributed to Netflix’s
slogan.
from Netflix’s DevOps strategy can be identified through analysis. Rather than being secret, Netflix’s practices adapted to
the atmosphere of the company and the demands of each situation and might not be relevant for all businesses. However,
DevOps has a lot to teach starting from IT teams and further.
• Security systems should not go against a dev team.
• Sharpen engineers’ knowledge and skills in their work by giving them liberty and responsibility.
• Do not try to focus on the availability at all as it may jeopardize the process.
• One of the main advantages of the startup ecosystem is the speed up of innovation.
• Cut out a whole cluster of processes as well as what’s written down.
• Practice context over control
• Aim to develop a product that is not widely standardized but features the facet of enhancement.
• Similarly, avoid silos, walls, and other things that enclose them.
• Implement the “you build it, you run it” approach to ensure the involvement of each employee at all levels of the
organization.
• The saying “The customer is always right” can be found in many sectors probably because of its validity.
• No, it won’t be DevOps, and it only concentrates on the culture.
X. C ONCLUSION
In summary, the incorporation of DevSecOps into a cloud-native framework is crucial for organizations seeking to strengthen
their digital infrastructure against evolving cybersecurity risks. By integrating security measures throughout the software
development process, from inception to deployment and beyond, companies can proactively detect and address potential
weaknesses. This strategy promotes a cooperative atmosphere where development, operations, and security teams collaborate,
dismantling traditional barriers and encouraging collective accountability for security. Utilizing automation and orchestration
tools allows organizations to streamline security procedures, including automated testing and ongoing monitoring, ensuring
uniformity and effectiveness across platforms. Embracing DevSecOps principles not only bolsters the resilience of cloud-
native applications but also guarantees adherence to regulatory requirements, ultimately protecting sensitive data and upholding
organizational credibility in a constantly changing digital environment.
R EFERENCES
[1] M. Armbrust et al., ”Above the cloud: A Berkeley view of cloud computing,” ACM Transactions on Computer Systems (TOCS), vol. 28, no. 1, pp. 1-44,
2010.
[2] R. Buyya et al., ”Cloud computing and emerging technologies: Recent progress and future directions,” ACM Computing Surveys (CSUR), vol. 44, no.
[3] Li et al., ”Cloud computing and financial services: Security and risk considerations,” International Journal of Electronic Finance, vol. 5, no. 1, pp. 1-19,
2011.
[4] P. Mell and T. Grance, ”The NIST definition of cloud computing,” National Institute of Standards and Technology (NIST), vol. 53, no. 6, 2011.
[5] Newman, S. (2015). Building Microservices: Designing Fine-Grained Systems. O’Reilly Media.
[6] Pries, R., Guinea, D., & Sala, R. (2014, April). Microservice architecture as a design style for cloud-native applications. In 2014 IEEE Symposium on
Service-Oriented Systems Applications (IEEE SOSO) (pp. 301-309). IEEE.
[7] Jamison, P., Beda, F., & Farley, S. (2016). Building Microservices: Simplifying Software Design. O’Reilly Media.
[8] Humble, J., & Farley, D. (2010). Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation. Addison-Wesley
Professional.
[9] Cloud Security Alliance (CSA). (2023). Top Threats to Cloud Computing: Evolving Landscape, Increased Risk. https://cloudsecurityalliance.org/
press-releases/2022/06/07/cloud-security-alliance-s-top-threats-to-cloud-computing-pandemic-11-report-finds-traditional-cloud-security-issues-becoming-less-concernin
[10] Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. National Institute of Standards and Technology. https://nvlpubs.nist.gov/
nistpubs/legacy/sp/nistspecialpublication800-145.pdf
[11] National Institute of Standards and Technology (NIST). (2023). Security and Privacy Controls for Federal Information Systems and Organizations (Special
Publication 800-53 Rev. 5). https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final
[12] Microsoft Azure. (2023). Shared responsibility model for cloud security. https://learn.microsoft.com/en-us/azure/security/fundamentals/
shared-responsibility
[13] IANS Institute of Advanced Network Security. (2023, April 12). Shift Left Security Testing - IANS Institute. https://www.iansresearch.com/
[14] National Institute of Standards and Technology (NIST). (2023, April 13). Security and Privacy Controls for Federal Information Systems and Organizations
(Special Publication 800-53 Rev. 5). https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final
[15] The DevSecOps Center. (2023). The Five Core Principles of DevSecOps.
[16] S. Kuraku, D. Kalla, F. Samaah, and N. Smith, ”Cultivating Proactive Cybersecurity Culture among IT Professionals to Combat Evolving Threats,”
International Journal of Electrical, Electronics, and Computers, vol. 8, no. 6, 2023.
[17] S. Kuraku, D. Kalla, F. Samaah, and N. Smith, ”Cultivating Proactive Cybersecurity Culture among IT Professionals to Combat Evolving Threats,”
International Journal of Electrical, Electronics, and Computers, vol. 8, no. 6, 2023.
[18] D. Kalla, N. Smith, F. Samaah, and K. Polimetla, ”Facial Emotion and Sentiment Detection Using Convolutional Neural Network,” Indian Journal of
Artificial Intelligence Research (INDJAIR), vol. 1, no. 1, pp. 1-13, 2021.
[19] D. Kalla, D. S. Kuraku, and F. Samaah, ”Enhancing cyber security by predicting malware using supervised machine learning models,” International
Journal of Computing and Artificial Intelligence, vol. 2, no. 2, pp. 55-62, 2021.
[20] IANS Institute of Advanced Network Security. (2023, April 12). Shift Left Security Testing - IANS Institute. https://www.iansresearch.com/
[21] National Institute of Standards and Technology (NIST). (2023, April 13). Security and Privacy Controls for Federal Information Systems and Organizations
(Special Publication 800-53 Rev. 5). https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final
[22] The DevSecOps Center. (2023). The Five Core Principles of DevSecOps.
[23] S. Kuraku, D. Kalla, F. Samaah, and N. Smith, ”Cultivating Proactive Cybersecurity Culture among IT Professionals to Combat Evolving Threats,”
International Journal of Electrical, Electronics, and Computers, vol. 8, no. 6, 2023.
[24] S. Kuraku, D. Kalla, F. Samaah, and N. Smith, ”Cultivating Proactive Cybersecurity Culture among IT Professionals to Combat Evolving Threats,”
International Journal of Electrical, Electronics, and Computers, vol. 8, no. 6, 2023.
[25] D. Kalla, N. Smith, F. Samaah, and K. Polimetla, ”Facial Emotion and Sentiment Detection Using Convolutional Neural Network,” Indian Journal of
Artificial Intelligence Research (INDJAIR), vol. 1, no. 1, pp. 1-13, 2021.
[26] D. Kalla, D. S. Kuraku, and F. Samaah, ”Enhancing cyber security by predicting malware using supervised machine learning models,” International
Journal of Computing and Artificial Intelligence, vol. 2, no. 2, pp. 55-62, 2021.
[27] Vulnerability Management Maturity Model (VMMM). (2024). Available: https://www.sans.org/blog/vulnerability-management-maturity-model/
[28] National Institute of Standards and Technology (NIST). (2020). Special Publication 800-160: Supply Chain Risk Management Practices for Federal
Information Systems and Organizations (SP 800-160).
[29] OWASP. (2023). OWASP Top 10 Web Application Security Risks. https://owasp.org/www-project-top-ten/
[30] Chen, L., Mao, Z., Kang, B., & Huang, P. (2019, September). A hierarchical approach to secure software development lifecycle for cloud-native
applications. In 2019 IEEE International Conference on Cloud Engineering (ICME) (pp. 1-10). IEEE.
[31] National Institute of Standards and Technology (NIST). (2020). Special Publication 800-160: Supply Chain Risk Management Practices for Federal
Information Systems and Organizations (SP 800-160). https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-161.pdf
[32] Verreydt, J., Decotigny, F., & Čeh, M. (2021, July). A systematic literature review on security-by-design in agile software development. In 2021 44th
IEEE Software Engineering Conference (SEPIC) (pp. 1-11). IEEE.
[33] Marchesi, S., Männistö, T., & Mikkonen, T. (2020, September). Security checklists for DevSecOps pipelines. In 2020 44th IEEE Annual Computer
Software and Applications Conference (COMPSAC) (Vol. 1, pp. 1426-1433). IEEE.
[34] Gupta, S., & Krishna, P. (2020). A survey of runtime application self-protection (RASP) techniques. ACM Computing Surveys (CSUR), 53(3), 1-37.
[35] National Institute of Standards and Technology (NIST). (2020, December). Special Publication 800-160: Supply Chain Risk Management Practices for
Federal Information Systems and Organizations (SP 800-160). Retrieved from https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-161.pdf
[36] Moustafa, N., & Sitnikova, E. (2017, December). DevSecOps: A Primer on Security in DevOps. In 2017 IEEE International Conference on Engineering
Management and Service Sciences (ICEMSS) (pp. 1-5). IEEE. doi: 10.1109/ICEMSS.2017.8289922
[37] Cloud Security Alliance (CSA). (2023). Security in Cloud Computing Controls Matrix (CSCM) v4.0. Retrieved from https://cloudsecurityalliance.org/
research/cloud-controls-matrix
[38] Qi, Y., Xu, X., & Zhao, L. (2018, September). A Survey of Security Automation in DevOps. In 2018 IEEE International Conference on Software
Maintenance and Evolution (ICSM) (pp. 153-164). IEEE. doi: 10.1109/ICSM.2018.00
[39] Simform. How Netflix Became A Master of DevOps? An Exclusive Case Study. [Online]. https://www.simform.com/blog/netflix-devops-case-study/
[40] Manepalli, S. (2021, January 21). Building end-to-end AWS DevSecOps CI/CD pipeline with open-source SCA, SAST, and DAST tools. Retrieved from
https://aws.amazon.com/blogs/devops/building-end-to-end-aws-devsecops-ci-cd-pipeline-with-open-source-sca-sast-and-dast-tools/