Published July 11, 2022 | Version v1
Conference paper Open

Assessing Architecture Conformance to Security-Related Practices in Infrastructure as Code Based Deployments

  • 1. University of Vienna
  • 2. University of Stuttgart

Description

Infrastructure as Code (IaC) enables developers and operations teams to automatically deploy and manage an IT infrastructure via software. Among other uses, IaC is widely used in the context of continuously released deployments such as those of microservice and other cloud-based systems. Although IaC-based deployments have been utilized by many companies, there are no approaches on checking their conformance to architectural aspects yet. In this paper, we focus on security-related practices including observability, access control, and traffic control in IaC-based deployments. While best practices for this topic have been documented in some gray literature sources such as practitioners' blogs and public repositories, approaches enabling automated checking of conformance to such best practices do not yet exist. We propose a model-based approach based on generic, technology-independent metrics, tied to typical architectural design decisions on IaC-based deployments. With this approach, we can measure conformance to security-related practices. We demonstrate and assess the validity and appropriateness of these metrics in assessing a system's conformance to practices through regression analysis.

Files

paper.pdf

Files (338.3 kB)

Name Size Download all
md5:5a758ec8a84437a0dc089dd4a1131c57
338.3 kB Preview Download

Additional details

Funding

FWF Austrian Science Fund
Infrastructure-as-code Architecture Decision Compliance I 4731
European Commission
AssureMOSS - Assurance and certification in secure Multi-party Open Software and Services. 952647