首页> 外文会议>International Conference on Technical Debt >Leveraging SecDevOps to Tackle the Technical Debt Associated with Cybersecurity Attack Tactics
【24h】

Leveraging SecDevOps to Tackle the Technical Debt Associated with Cybersecurity Attack Tactics

机译:利用SECDEVOPS解决与网络安全攻击策略相关的技术债务

获取原文

摘要

Context: Managing technical debt (TD) associated with external cybersecurity attacks on an organization can significantly improve decisions made when prioritizing which security weaknesses require attention. Whilst source code vulnerabilities can be found using static analysis techniques, malicious external attacks expose the vulnerabilities of a system at runtime and can sometimes remain hidden for long periods of time. By mapping malicious attack tactics to the consequences of weaknesses (i.e. exploitable source code vulnerabilities) we can begin to understand and prioritize the refactoring of the source code vulnerabilities that cause the greatest amount of technical debt on a system. Goal: To establish an approach that maps common external attack tactics to system weaknesses. The consequences of a weakness associated with a specific attack technique can then be used to determine the technical debt principal of said violation; which can be measured in terms of loss of business rather than source code maintenance. Method: We present a position study that uses Jaccard similarity scoring to examine how 11 malicious attack tactics can relate to Common Weakness Enumerations (CWEs). Results: We conduct a study to simulate attacks, and generate dependency graphs between external attacks and the technical consequences associated with CWEs. Conclusion: The mapping of cyber security attacks to weaknesses allows operational staff (SecDevOps) to focus on deploying appropriate countermeasures and allows developers to focus on refactoring the vulnerabilities with the greatest potential for technical debt.
机译:背景信息:管理与组织外部网络安全攻击相关的技术债务(TD)可以显着改善在优先考虑安全弱点需要注意的情况下提出的决定。源代码漏洞可以使用静态分析技术找到,恶意外部攻击在运行时公开了系统的漏洞,有时可以长时间隐藏。通过将恶毒攻击策略映射到弱点的后果(即,可利用源代码漏洞),我们可以开始了解并优先考虑源代码漏洞的重构,导致系统上最大的技术债务。目标:建立一种映射普通外部攻击策略的方法,以系统缺点。然后可以使用与特定攻击技术相关的弱点的后果来确定所违反的技术债务;可以在业务丢失而不是源代码维护方面来衡量。方法:我们提出了一种使用Jaccard相似性评分的位置研究,以检查11种恶意攻击策略如何与常见的弱点枚举(CWE)相关。结果:我们进行研究以模拟攻击,并在外部攻击与与CWE相关的技术后果之间产生依赖图。结论:网络安全攻击对劣势的映射允许运营人员(SECDEVOPS)专注于部署适当的对策,并允许开发人员专注于重构漏洞,最大的技术债务潜力最大。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号