Article (Périodiques scientifiques)
Vulnerabilities in infrastructure as code: what, how many, and who?
WAR, Aicha; DIALLO, Alioune; HABIB, Andrew et al.
2025In Empirical Software Engineering, 30 (5)
Peer reviewed vérifié par ORBi
 

Documents


Texte intégral
5fea15ee-1627-4240-9b1b-b0ddc112e2d1-2.pdf
Postprint Éditeur (1.63 MB)
Demander un accès

Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
DevOps; DevSecOps; Infrastructure as code; SecDevOps; Security smells; Security testing; Software vulnerability; Code components; Code security; Devsecop; IT services; IT system; Secdevops; Security smell; Software vulnerabilities; Software
Résumé :
[en] Infrastructure as Code (IaC) is a pivotal approach for deploying and managing IT systems and services using scripts, offering flexibility and numerous benefits. However, the presence of security flaws in IaC scripts can have severe consequences, as exemplified by the recurring exploits of Cloud Web Services. Recent studies in the literature have investigated IaC security issues, but they often focus on individual components (IaC tools or scripts), providing only preliminary insights. Our research extends the current knowledge by conducting a comprehensive investigation into various aspects of IaC security, encompassing its components. We explore vulnerabilities in terms of types, their predominant locations, contributor responsibilities for introducing vulnerabilities, and more. Our methodology relies on widely adopted static security testing tools, which analyze over 1600 repositories to identify IaC vulnerabilities. Our empirical study yields valuable observations, highlighting severe and recurrent vulnerabilities within IaC, while also categorizing their severity and types. We delve deeper into vulnerability patterns, examining source code, dependencies, and manifest files across IaC components, including tools, scripts, and add-ons (libraries or plugin tools). The study uncovers that IaC components are plagued by exploitable vulnerabilities that span all ten categories of security bugs outlined in the OWASP Top 10 2021. Furthermore, our investigation reveals that even when maintainers employ security tools to address vulnerabilities, they do not integrate them systematically into their automation routines. Consequently, we propose that IT teams need to foster stronger collaboration across DevOps profiles (developers and IT operators) and break down the boundaries with security operators to enhance Infrastructure as Code’s security posture through the adoption of DevSecOps practices.
Centre de recherche :
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > TruX - Trustworthy Software Engineering
Disciplines :
Sciences informatiques
Auteur, co-auteur :
WAR, Aicha  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
DIALLO, Alioune  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
HABIB, Andrew ;  ABB Corporate Research Center of Germany, Baden, Switzerland
KLEIN, Jacques  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
BISSYANDE, Tegawendé François d Assise  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
Co-auteurs externes :
yes
Langue du document :
Anglais
Titre :
Vulnerabilities in infrastructure as code: what, how many, and who?
Date de publication/diffusion :
05 mai 2025
Titre du périodique :
Empirical Software Engineering
ISSN :
1382-3256
eISSN :
1573-7616
Maison d'édition :
Springer
Volume/Tome :
30
Fascicule/Saison :
5
Peer reviewed :
Peer reviewed vérifié par ORBi
Focus Area :
Computational Sciences
Subventionnement (détails) :
This work is funded by the Ministére des Affaires Etrangéres et Européennes (MAEE) of Luxembourg through their Digital4Development (D4D) portfolio under the project LuxWAyS (Luxembourg/West-Africa Lab for Higher Education Capacity Building in CyberSecurity and Emerging Topics in ICT4Dev).
Disponible sur ORBilu :
depuis le 07 juillet 2025

Statistiques


Nombre de vues
66 (dont 4 Unilu)
Nombre de téléchargements
1 (dont 1 Unilu)

citations Scopus®
 
2
citations Scopus®
sans auto-citations
2
OpenCitations
 
0
citations OpenAlex
 
1
citations WoS
 
0

Bibliographie


Publications similaires



Contacter ORBilu