...
首页> 外文期刊>ACM transactions on software engineering and methodology >Security Smells in Ansible and Chef Scripts: A Replication Study
【24h】

Security Smells in Ansible and Chef Scripts: A Replication Study

机译:Ansible和Chef脚本中的安全气味:复制研究

获取原文
获取原文并翻译 | 示例
           

摘要

Context: Security smells are recurring coding patterns that are indicative of security weakness and require further inspection. As infrastructure as code (IaC) scripts, such as Ansible and Chef scripts, are used to provision cloud-based servers and systems at scale, security smells in IaC scripts could be used to enable malicious users to exploit vulnerabilities in the provisioned systems. Goal: The goal of this article is to help practitioners avoid insecure coding practices while developing infrastructure as code scripts through an empirical study of security smells in Ansible and Chef scripts. Methodology: We conduct a replication study where we apply qualitative analysis with 1,956 IaC scripts to identify security smells for IaC scripts written in two languages: Ansible and Chef. We construct a static analysis tool called Security Linter for Ansible and Chef scripts (SLAC) to automatically identify security smells in 50,323 scripts collected from 813 open source software repositories. We also submit bug reports for 1,000 randomly selected smell occurrences. Results: We identify two security smells not reported in prior work: missing default in case statement and no integrity check. By applying SLAC we identify 46,600 occurrences of security smells that include 7,849 hard-coded passwords. We observe agreement for 65 of the responded 94 bug reports, which suggests the relevance of security smells for Ansible and Chef scripts amongst practitioners. Conclusion: We observe security smells to be prevalent in Ansible and Chef scripts, similarly to that of the Puppet scripts. We recommend practitioners to rigorously inspect the presence of the identified security smells in Ansible and Chef scripts using (ⅰ) code review, and (ⅱ) static analysis tools.
机译:背景信息:安全气味是反复性的编码模式,其指示安全弱点,需要进一步检查。作为基础架构作为代码(IAC)脚本(例如Ansible和Chef脚本),用于以规模提供基于云的服务器和系统,可用于启用恶意用户的安全气味来启用可编程用户在配置系统中利用漏洞。目标:本文的目标是帮助从业人员避免不安全的编码实践,同时通过对ASSIBE和厨师脚本中的安全气味的实证研究发展基础设施作为代码脚本。方法论:我们进行复制研究,我们使用1,956个IAC脚本进行定性分析,以确定用两种语言编写的IAC脚本的安全气味:ANSIBLE和CHEF。我们构建一个静态分析工具,称为Assible和Chef脚本(SLAC)的安全LINTER,以自动识别从813个开源软件存储库收集的50,323脚本中的安全气味。我们还提交错误报告为1,000个随机选择的嗅觉出现。结果:我们确定了在事先工作中未报告的两个安全气味:毫无默认情况下缺少案例声明,没有完整性检查。通过应用SLAC,我们识别46,600个出现的安全气味,包括7,849个硬编码密码。我们遵守65个回复的94个错误报告的协议,这表明在从业者之间的安全闻和厨师脚本的安全气味的相关性。结论:我们在ASSible和Chef脚本中遵循安全气味,与傀儡脚本类似。我们建议从业者在使用(Ⅰ)代码审查和(Ⅱ)静态分析工具中,严格检查Ansible和Chef脚本中所确定的安全气味的存在。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号