Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based infrastructure Management
نویسندگان
چکیده
Despite being beneficial for managing computing infrastructure automatically, Puppet manifests are susceptible to security weaknesses, e.g., hard-coded secrets and use of weak cryptography algorithms. Adequate mitigation weaknesses in is thus necessary secure that managed with manifests. A characterization how propagate affect Puppet-based management, can inform practitioners on the relevance detected as well help them take actions mitigation. We conduct an empirical study 17,629 Taint Tracker xmlns:xlink="http://www.w3.org/1999/xlink">Pup pet Manifests ( xmlns:xlink="http://www.w3.org/1999/xlink">TaintPup ). observe 2.4 times more precision, 1.8 F-measure TaintPup, compared a state-of-the-art static analysis tool. From our study, we into 4,457 resources, i.e, Puppet-specific code elements used manage infrastructure. single instance weakness many 35 distinct resources. 7 categories which include resources continuous integration servers network controllers. According survey 24 practitioners, propagation data storage-related rated have most severe impact management.
منابع مشابه
supply and demand security of energy in central asia and the caucasus
امنیت انرژی به معنی عرضه مداوم و پایدار همراه با قیمت های معقول در حامل های انرژی، که تهدیدات امنیتی، سیاسی، اقتصادی، محیط زیستی و روانی را کاهش دهد. امروزه نفت و گاز تنها، کالای تجاری نیست بلکه بعنوان ابزار سیاسی مورد استفاده قرار می گیرد.اختلاف میان روسیه و اکراین بر سر انرژی در ژانویه 2006، تهدیدی برای امنیت انرژی اروپا ایجاد کرد. در این تحقیق ما تلاش کردیم که نقش انرژی آسیای میانه و قفقاز ر...
15 صفحه اولSecurity Weaknesses in Bluetooth
We point to three types of potential vulnerabilities in the Bluetooth standard, version 1.0B. The first vulnerability opens up the system to an attack in which an adversary under certain circumstances is able to determine the key exchanged by two victim devices, making eavesdropping and impersonation possible. This can be done either by exhaustively searching all possible PINs (but without inte...
متن کاملSecurity Infrastructure for A Web Service Based Resource Management System
symmetric key cryptography, authentication, access control, integrity checking, Kerberos, global resource management, grid computing A global resource management system intends to aggregate all kinds of heterogeneous resources that are geographically distributed so that a uniform resource programming interface can be provided to applications. The emerging web service model with single SOAP-base...
متن کاملlangauge needs analysis of undergraduate business management and economics students
the aim of conducting this study was to investigate the foreign language learning needs of undergraduate economics students and business management students in faculties of social sciences of alzahra and azad naragh university. in the study, which was designed on the basis of a qualitative-quantitative basis using interviews and questionnaires, 146 female undergraduate business management as we...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Software Engineering
سال: 2023
ISSN: ['0098-5589', '1939-3520', '2326-3881']
DOI: https://doi.org/10.1109/tse.2023.3265962