Abstract
Over recent years, Development, Security, and Operations (DevSecOps, hereafter) has evolved as a unique shift-left strategy that integrates security practices, early on in the Development and Operations (DevOps, for short) software development methodology. However, DevSecOps is not devoid of challenges. Insecure tools and insider attacks are some of the threats that can escape the security controls enforced in DevSecOps pipelines. In this paper, we analyze the possibility of embedding Zero Trust into the organization's developer workflow as a strategy to further secure DevSecOps by removing the implicit trust among the various components of the pipelines. Based on a systematic review of the present literature and for each phase of the DevSecOps life cycle, we evaluated the possible integration of current ZTA approaches.
| Lingua originale | Inglese |
|---|---|
| Pagine | 546-554 |
| Numero di pagine | 9 |
| DOI | |
| Stato di pubblicazione | Pubblicato - 2025 |
| Evento | 10th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2025 - Ca'Foscari University, ita Durata: 1 gen 2025 → … |
???event.eventtypes.event.conference???
| ???event.eventtypes.event.conference??? | 10th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2025 |
|---|---|
| Città | Ca'Foscari University, ita |
| Periodo | 1/01/25 → … |
Keywords
- CI/CD Pipeline security
- DevSecOps
- Zero Trust Architecture
- ZTA
Fingerprint
Entra nei temi di ricerca di 'Sok: Zero Trust as a Strategy to Address Devsecops Challenges'. Insieme formano una fingerprint unica.Cita questo
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver