Abstract
With the advancement of IT, the cycle from development to operations in software development is getting faster, and mainly many large companies have been adopting DevOps to keep up. Meanwhile, DevSecOps, a development methodology designed to improve the security quality of DevOps, is gaining attention due to the increasing number of security incidents. However, DevSecOps adoption is still not well understood enough to maintain an adequate level of security. We therefore developed a method to promote the introduction of DevSecOps for improving security quality in software development. Specifically, we first analyzed the results of several software development exercises by students at the Chiba Institute of Technology to investigate how security features are implemented. Next, we conducted a detailed analysis of these implementations at each stage of the development process to clarify which ones should be implemented at each step and to identify guidelines for promoting the adoption of DevSecOps.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
TSF: TOE Security Functionality, TOE: Target of Evaluation.
References
Doors DX Media: “DevSecOps Days Tokyo” Report (1), https://www.brainpad.co.jp/doors/feature/devsecops_report_1/ (2021). (in Japanese)
Information-technology Promotion Agency, Japan (IPA), Basics of CC (ISO15408). https://www.ipa.go.jp/security/jisec/seminar/ps6vr7000000qsq5-att/cc_20060222.pdf (2006). (in Japanese)
IBM, What is DevSecOps ? https://www.ibm.com/jp-ja/topics/devsecops (in Japanese)
T. Kaneko, Introduction to Security by Design, IPA. https://www.ipa.go.jp/files/000055823.pdf (2016). (in Japanese)
Google Cloud, DevOps Capability. https://cloud.google.com/architecture/devops/capabilities. (in Japanese)
Doors DX Media, “DevSecOps Days Tokyo” Report (3), 2021. https://www.brainpad.co.jp/doors/feature/devsecops_report_3-1/ (in Japanese),
IT Dictionary, Common Criteria / ISO/IEC 15408. https://onl.tw/cGGvKsYd. (in Japanese)
Information-technology Promotion Agency, Japan (IPA), Overview of CC (ISO/IEC 15408). https://www.ipa.go.jp/security/jisec/about_cc.html (2008). (in Japanese)
NISC, Measures to ensure information security from the planning and design stages (SBD (Security by Design)). https://www.nisc.go.jp/active/general/pdf/SBD_overview.pdf (in Japanese)
CyberSecurity.com, What is Security by Design? A thorough explanation of its necessity, benefits, and precautions. https://cybersecurity-jp.com/security-measures/29134 (2020). (in Japanese)
TECH+, 5 Issues impeding the shift to DevSecOps and how to solve them. https://news.mynavi.jp/techplus/kikaku/20211207-2208996/ (in Japanese)
Synopsys: DevSecOps has moved from a consideration to an essential issue. https://www.synopsys.com/blogs/software-security/ja-jp/gartner-critical-capabilities-appsec-devsecops/ (2022). (in Japanese)
Akbar, M.A., et al.: Toward successful DevSecOps in software development organizations: a decision-making framework. Inform. Softw. Technol. 147, 106894 (2022)
Jeganathan, S.: DevSecOps: a systemic approach for secure software development. ISSA J. 17(11), p20-27 (2019)
Efendi, M., et al.: DevSecOps approach in software development case study: public company logistic agency. In: International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS) (2021). https://doi.org/10.1109/ICIMCIS53775.2021.9699316
Ahmed, Z., et al.: Integrating security with DevSecOps: techniques and challenges. In: 2019 International Conference on Digitization (ICD). https://doi.org/10.1109/ICD47981.2019.9105789
Ahmed, A.: DevSecOps: Enabling Security by Design in Rapid Software Development, - 2019 - studenttheses.uu.nl, https://studenttheses.uu.nl/handle/20.500.12932/31896
Prates, L., Faustino, J., Silva, M., Pereira, R.: DevSecOps Metrics. In: Wrycza, S., Maślankowski, J. (eds.) Information Systems: Research, Development, Applications, Education: 12th SIGSAND/PLAIS EuroSymposium 2019, Gdansk, Poland, September 19, 2019, Proceedings, pp. 77–90. Springer International Publishing, Cham (2019). https://doi.org/10.1007/978-3-030-29608-7_7
Andre Morales, J., et al.: Security impacts of sub-optimal DevSecOps implementations in a highly regulated environment. In: ARES‘20: Proceedings of the 15th International Conference on Availability, Reliability and Security, Article No.: 63, pp. 1–8 (2020). https://doi.org/10.1145/3407023.3409186
Rahul, B.S., et al.: Implementation of DevSecOps using open-source tools. Int. J. Adv. Res., Ideas Innov. Technol. 5(3), 1050–1051. www.ijariit.com
Shimoda, A., et al.: Software development PBL in university. J. Soc. Project Manag. 16(2), 15–20 (2014). (in Japanese)
Common Criteria for Information Technology Security Evaluation, Part 2: Security functional components. https://commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf (2017)
Kaneko, H.: Security and Computers, Security Assurance and Evaluation, Citizen's Lecture Series 2009, National Institute of Informatics. https://www.nii.ac.jp/userdata/shimin/documents/H21/090611_1stlec02.pdf (in Japanese)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Tanimoto, S., Okuwaki, Y., Kato, K., Kounosu, T., Takuma, H., Toyama, M. (2023). Method for Promoting the Introduction of DevSecOps to Improve Security Quality. In: Barolli, L. (eds) Advances in Networked-based Information Systems. NBiS 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 183. Springer, Cham. https://doi.org/10.1007/978-3-031-40978-3_39
Download citation
DOI: https://doi.org/10.1007/978-3-031-40978-3_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-40977-6
Online ISBN: 978-3-031-40978-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)