Peer Reviewed Article
Vol. 6 (2021)
DevSecOps: Integrating Security into the DevOps Lifecycle for Enhanced Resilience
Lead Engineer - Databases, Grab Technology, 777 108th Ave NE Unit 1900, Bellevue, WA 98004, USA
Abstract
To improve resilience and reduce security risks, DevSecOps advocates integrating security practices into the DevOps lifecycle. This strategy transforms the software development process. The main facets of DevSecOps are examined in this paper, including real-world case studies, automation of security procedures, resilience testing, cultural shifts, and emerging trends. The study aims to investigate the significance of incorporating security into the DevOps lifecycle, pinpoint practical approaches for executing DevSecOps procedures, and investigate forthcoming patterns and advancements molding the DevSecOps terrain. The report uses a thorough literature review, analysis of case studies from the actual world, and investigation of new developments and trends in DevSecOps. The main conclusions emphasize how important it is to promote cooperation, automate and test for resilience, use real-world case studies, and embrace emerging trends and technologies to improve security, resilience, and efficiency across the software development lifecycle. To successfully implement DevSecOps principles, firms must face organizational opposition to change, resource restrictions, and regulatory compliance requirements. Organizations can create safe and robust software systems and better handle the demands of today's ever-changing threat landscape by adopting the concepts and practices of DevSecOps.
References
- Ahmed, B., Abdelaziz, A., Sayed, A., Elfangary, L., Fahmy, H. (2021). Monitoring Real-Time Security Attacks for IoT Systems Using DevSecOps: A Systematic Literature Review. Information, 12(4), 154. https://doi.org/10.3390/info12040154
- Alenezi, M., Zarour, M., Alsulis, S. (2019). DevOps Development Process Awareness and Adoption -The Case of Saudi Arabia. i-Manager's Journal on Software Engineering, 14(1), 21-33. https://doi.org/10.26634/jse.14.1.16519
- Ande, J. R. P. K., & Khair, M. A. (2019). High-Performance VLSI Architectures for Artificial Intelligence and Machine Learning Applications. International Journal of Reciprocal Symmetry and Theoretical Physics, 6, 20-30. https://upright.pub/index.php/ijrstp/article/view/121
- Anumandla, S. K. R. (2018). AI-enabled Decision Support Systems and Reciprocal Symmetry: Empowering Managers for Better Business Outcomes. International Journal of Reciprocal Symmetry and Theoretical Physics, 5, 33-41. https://upright.pub/index.php/ijrstp/article/view/129
- de Vicente, J. M., Higuera, J. B.,; Higuera, B. J. R. (2019). The Application of a New Secure Software Development Life Cycle (S-SDLC) with Agile Methodologies. Electronics, 8(11), 1218. https://doi.org/10.3390/electronics8111218
- Desai, R., Nisha, T. N. (2021). Best Practices for Ensuring Security in DevOps: A Case Study Approach. Journal of Physics: Conference Series, 1964(4). https://doi.org/10.1088/1742-6596/1964/4/042045
- Dhameliya, N., Mullangi, K., Shajahan, M. A., Sandu, A. K., & Khair, M. A. (2020). Blockchain-Integrated HR Analytics for Improved Employee Management. ABC Journal of Advanced Research, 9(2), 127-140. https://doi.org/10.18034/abcjar.v9i2.738
- Khair, M. A. (2018). Security-Centric Software Development: Integrating Secure Coding Practices into the Software Development Lifecycle. Technology & Management Review, 3, 12-26. https://upright.pub/index.php/tmr/article/view/124
- Khair, M. A., Ande, J. R. P. K., Goda, D. R., & Yerram, S. R. (2019). Secure VLSI Design: Countermeasures against Hardware Trojans and Side-Channel Attacks. Engineering International, 7(2), 147–160. https://doi.org/10.18034/ei.v7i2.699
- Khair, M. A., Mahadasa, R., Tuli, F. A., & Ande, J. R. P. K. (2020). Beyond Human Judgment: Exploring the Impact of Artificial Intelligence on HR Decision-Making Efficiency and Fairness. Global Disclosure of Economics and Business, 9(2), 163-176. https://doi.org/10.18034/gdeb.v9i2.730
- Khair, M. A., Tejani, J. G., Sandu, A. K., & Shajahan, M. A. (2020a). Trade Policies and Entrepreneurial Initiatives: A Nexus for India’s Global Market Integration. American Journal of Trade and Policy, 7(3), 107–114. https://doi.org/10.18034/ajtp.v7i3.706
- Koehler, S., Dhameliya, N., Patel, B., & Anumandla, S. K. R. (2018). AI-Enhanced Cryptocurrency Trading Algorithm for Optimal Investment Strategies. Asian Accounting and Auditing Advancement, 9(1), 101–114. https://4ajournal.com/article/view/91
- Maddula, S. S. (2018). The Impact of AI and Reciprocal Symmetry on Organizational Culture and Leadership in the Digital Economy. Engineering International, 6(2), 201–210. https://doi.org/10.18034/ei.v6i2.703
- Maddula, S. S., Shajahan, M. A., & Sandu, A. K. (2019). From Data to Insights: Leveraging AI and Reciprocal Symmetry for Business Intelligence. Asian Journal of Applied Science and Engineering, 8(1), 73–84. https://doi.org/10.18034/ajase.v8i1.86
- Morales, J., Yasar, H., Volkmann, A. (2018). Weaving Security into DevOps Practices in Highly Regulated Environments. International Journal of Systems and Software Security and Protection, 9(1), 18-46. https://doi.org/10.4018/IJSSSP.2018010102
- Mullangi, K. (2017). Enhancing Financial Performance through AI-driven Predictive Analytics and Reciprocal Symmetry. Asian Accounting and Auditing Advancement, 8(1), 57–66. https://4ajournal.com/article/view/89
- Mullangi, K., Maddula, S. S., Shajahan, M. A., & Sandu, A. K. (2018). Artificial Intelligence, Reciprocal Symmetry, and Customer Relationship Management: A Paradigm Shift in Business. Asian Business Review, 8(3), 183–190. https://doi.org/10.18034/abr.v8i3.704
- Pydipalli, R. (2018). Network-Based Approaches in Bioinformatics and Cheminformatics: Leveraging IT for Insights. ABC Journal of Advanced Research, 7(2), 139-150. https://doi.org/10.18034/abcjar.v7i2.743
- Rodriguez, M., Tejani, J. G., Pydipalli, R., & Patel, B. (2018). Bioinformatics Algorithms for Molecular Docking: IT and Chemistry Synergy. Asia Pacific Journal of Energy and Environment, 5(2), 113-122. https://doi.org/10.18034/apjee.v5i2.742
- Russo, B., Jaatun, M., Abrahamsson, P., Botterweck, G., Ghanbari, H. (2020). Towards a Secure DevOps Approach for Cyber-Physical Systems: An Industrial Perspective. International Journal of Systems and Software Security and Protection, 11(2), 38-57. https://doi.org/10.4018/IJSSSP.2020070103
- Sandu, A. K., Surarapu, P., Khair, M. A., & Mahadasa, R. (2018). Massive MIMO: Revolutionizing Wireless Communication through Massive Antenna Arrays and Beamforming. International Journal of Reciprocal Symmetry and Theoretical Physics, 5, 22-32. https://upright.pub/index.php/ijrstp/article/view/125
- Shajahan, M. A. (2018). Fault Tolerance and Reliability in AUTOSAR Stack Development: Redundancy and Error Handling Strategies. Technology & Management Review, 3, 27-45. https://upright.pub/index.php/tmr/article/view/126
- Subramanian, A., Krishnamachariar, P., Gupta, M., Sharman, R. (2018). Auditing an Agile Development Operations Ecosystem. International Journal of Risk and Contingency Management, 7(4), 90-110. 10.4018/IJRCM.2018100105
- Tejani, J. G. (2017). Thermoplastic Elastomers: Emerging Trends and Applications in Rubber Manufacturing. Global Disclosure of Economics and Business, 6(2), 133-144. https://doi.org/10.18034/gdeb.v6i2.737
- Vahid, G., Borg, M., Markku, O. (2020). Practical Relevance of Software Engineering Research: Synthesizing the Community’s Voice. Empirical Software Engineering, 25(3), 1687-1754. https://doi.org/10.1007/s10664-020-09803-0
- Yerram, S. R., Mallipeddi, S. R., Varghese, A., & Sandu, A. K. (2019). Human-Centered Software Development: Integrating User Experience (UX) Design and Agile Methodologies for Enhanced Product Quality. Asian Journal of Humanity, Art and Literature, 6(2), 203-218. https://doi.org/10.18034/ajhal.v6i2.732
- Ying, D., Patel, B., & Dhameliya, N. (2017). Managing Digital Transformation: The Role of Artificial Intelligence and Reciprocal Symmetry in Business. ABC Research Alert, 5(3), 67–77. https://doi.org/10.18034/ra.v5i3.659
-
Vishal Reddy Vadiyala,
Innovative Frameworks for Next-Generation Cybersecurity: Enhancing Digital Protection Strategies
,
Technology & Management Review: Vol. 4 (2019)
-
Md Abul Khair,
Security-Centric Software Development: Integrating Secure Coding Practices into the Software Development Lifecycle
,
Technology & Management Review: Vol. 3 (2018)
-
Deng Ying,
Kanaka Rakesh Varma Kothapalli,
Manzoor Anwar Mohammed,
Rahimoddin Mohammed,
Prasanna Pasam,
Building Secure and Scalable Applications on Azure Cloud: Design Principles and Architectures
,
Technology & Management Review: Vol. 3 (2018)
-
Vishal Reddy Vadiyala,
Parikshith Reddy Baddam,
Mastering JavaScript's Full Potential to Become a Web Development Giant
,
Technology & Management Review: Vol. 2 (2017)
-
Pavani Surarapu,
Ravikiran Mahadasa,
Enhancing Web Development through the Utilization of Cutting-Edge HTML5
,
Technology & Management Review: Vol. 2 (2017)
-
Ravikiran Mahadasa,
Blockchain Integration in Cloud Computing: A Promising Approach for Data Integrity and Trust
,
Technology & Management Review: Vol. 1 (2016)
-
Parikshith Reddy Baddam,
Swathi Kaluvakuri,
The Power and Legacy of C Programming: A Deep Dive into the Language
,
Technology & Management Review: Vol. 1 (2016)
-
Marcus Rodriguez,
Manzoor Anwar Mohammed,
Rahimoddin Mohammed,
Prasanna Pasam,
Raghunath Kashyap Karanam,
Sai Charan Reddy Vennapusa,
Narasimha Rao Boinapalli,
Oracle EBS and Digital Transformation: Aligning Technology with Business Goals
,
Technology & Management Review: Vol. 4 (2019)
-
Karu Lal,
Venkata Koteswara Rao Ballamudi,
Unlock Data’s Full Potential with Segment: A Cloud Data Integration Approach
,
Technology & Management Review: Vol. 2 (2017)
-
Songtao Chen,
Chunhua Deming,
Harshini Priya Adusumalli,
Safety Assessment of IoT: Warning Scan for Security
,
Technology & Management Review: Vol. 3 (2018)
You may also start an advanced similarity search for this article.