Exploiting devops practices for dependable and secure continuous delivery pipelines
Continuous delivery (CD) pipelines recently gained wide adoption. They provide means for short and high-frequent development cycles in DevOps by automating many steps after a commit has been issued and bringing it into production. CD pipelines have become essential for development and delivery. Henc...
Saved in:
| Published in: | 2018 IEEE ACM 4th International Workshop on Rapid Continuous Software Engineering (RCoSE) pp. 27 - 30 |
|---|---|
| Main Authors: | , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
New York, NY, USA
ACM
29.05.2018
|
| Series: | ACM Conferences |
| Subjects: | |
| ISBN: | 9781450357456, 1450357458 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Continuous delivery (CD) pipelines recently gained wide adoption. They provide means for short and high-frequent development cycles in DevOps by automating many steps after a commit has been issued and bringing it into production. CD pipelines have become essential for development and delivery. Hence, they are crucial and business-critical assets that need to be protected from harm in terms of dependability and security. DevOps practices like canary releasing and A/B testing aim to improve the quality of the software that is built by CD pipelines while keeping a high pace of development. Although CD is a part of DevOps, the DevOps practices have primarily been applied to the artifacts that are processed but not on the pipelines themselves. We outline our vision of using these DevOps practices to improve the dependability and security of CD pipelines. The goal is to detect, diagnose, and resolve dependability and security issues in the CD pipeline behavior. In this paper, we outline our envisioned roadmap and preliminary results from an ongoing industrial case study. |
|---|---|
| AbstractList | Continuous delivery (CD) pipelines recently gained wide adoption. They provide means for short and high-frequent development cycles in DevOps by automating many steps after a commit has been issued and bringing it into production. CD pipelines have become essential for development and delivery. Hence, they are crucial and business-critical assets that need to be protected from harm in terms of dependability and security. DevOps practices like canary releasing and A/B testing aim to improve the quality of the software that is built by CD pipelines while keeping a high pace of development. Although CD is a part of DevOps, the DevOps practices have primarily been applied to the artifacts that are processed but not on the pipelines themselves. We outline our vision of using these DevOps practices to improve the dependability and security of CD pipelines. The goal is to detect, diagnose, and resolve dependability and security issues in the CD pipeline behavior. In this paper, we outline our envisioned roadmap and preliminary results from an ongoing industrial case study. |
| Author | Düllmann, Thomas F. Paule, Christina van Hoorn, André |
| Author_xml | – sequence: 1 givenname: Thomas F. surname: Düllmann fullname: Düllmann, Thomas F. organization: University of Stuttgart, Germany – sequence: 2 givenname: Christina surname: Paule fullname: Paule, Christina organization: University of Stuttgart, Germany – sequence: 3 givenname: André surname: van Hoorn fullname: van Hoorn, André organization: University of Stuttgart, Germany |
| BookMark | eNqNkDtPAzEQhI0ACQipKWhc0iT4efaVKAoPKRIFUFt-rJHhcj6dcxH591yUVFRU3-7OzhRzhc7a3AJCN5TMKRXyntNaqIrMD-QnaForPQqESyVkdfpnv0DTUr4IIazSoubkEr0tf7omp01qP3GAbe4K7nrrN8lDwTH347GDNljXALZtwAX80AP2uR0tQx7K-NCkLfQ73KVuHFso1-g82qbA9MgJ-nhcvi-eZ6vXp5fFw2pmmVCbmdeCaG4ZAyWEUhR8bYMVoZaxroIIJGhg0QknQXEfo6SV01wS5l1QrhJ8gm4PuQkATNente13RgvJKNmr84Nq_dq4nL-LocTsWzPH1o7kxvUJ4mi4-6eB_wJL521j |
| CODEN | IEEPAD |
| ContentType | Conference Proceeding |
| Copyright | 2018 ACM |
| Copyright_xml | – notice: 2018 ACM |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1145/3194760.3194763 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9781450357456 1450357458 |
| EndPage | 30 |
| ExternalDocumentID | 8452104 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IL 6IN AAJGR ABLEC ACM ADPZR ALMA_UNASSIGNED_HOLDINGS APO BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK GUFHI IEGSK OCL RIB RIC RIE RIL AAWTH LHSKQ |
| ID | FETCH-LOGICAL-a247t-c84083a22e744771ec9ada4d95f96d4d0d8e2fb4b5e73cff516b83502cbd7b643 |
| IEDL.DBID | RIE |
| ISBN | 9781450357456 1450357458 |
| ISICitedReferencesCount | 13 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000454838900006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:56:20 EDT 2025 Wed Jan 31 06:49:32 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| License | Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org |
| LinkModel | DirectLink |
| MeetingName | ICSE '18: 40th International Conference on Software Engineering |
| MergedId | FETCHMERGED-LOGICAL-a247t-c84083a22e744771ec9ada4d95f96d4d0d8e2fb4b5e73cff516b83502cbd7b643 |
| PageCount | 4 |
| ParticipantIDs | acm_books_10_1145_3194760_3194763_brief ieee_primary_8452104 acm_books_10_1145_3194760_3194763 |
| PublicationCentury | 2000 |
| PublicationDate | 20180529 2018-May |
| PublicationDateYYYYMMDD | 2018-05-29 2018-05-01 |
| PublicationDate_xml | – month: 05 year: 2018 text: 20180529 day: 29 |
| PublicationDecade | 2010 |
| PublicationPlace | New York, NY, USA |
| PublicationPlace_xml | – name: New York, NY, USA |
| PublicationSeriesTitle | ACM Conferences |
| PublicationTitle | 2018 IEEE ACM 4th International Workshop on Rapid Continuous Software Engineering (RCoSE) |
| PublicationTitleAbbrev | RCoSE |
| PublicationYear | 2018 |
| Publisher | ACM |
| Publisher_xml | – name: ACM |
| SSID | ssj0002684930 |
| Score | 2.202075 |
| Snippet | Continuous delivery (CD) pipelines recently gained wide adoption. They provide means for short and high-frequent development cycles in DevOps by automating... |
| SourceID | ieee acm |
| SourceType | Publisher |
| StartPage | 27 |
| SubjectTerms | Chaos Engineering CI/CD Pipeline Continuous Software Engineering Cotinuous Delivery Pipeline CSE DevOps IT Security Monitoring Pipelines Production Security Software Software Performance Software Reliability Testing |
| Title | Exploiting devops practices for dependable and secure continuous delivery pipelines |
| URI | https://ieeexplore.ieee.org/document/8452104 |
| WOSCitedRecordID | wos000454838900006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwEA5z-ODT1E2cv4gg-GJdliZL8qwOn2ZBhb2V_CoUtBvrOvC_N9fWiSCITykhEDhy3H3X-75D6MpCbS3ArshS5yLGiY4UscHxlAQ8JC3hrh42IWYzOZ-rpINutlwY733dfOZv4bP-l-8WtoJS2UiyEGxA_HNHCNFwtbb1FFAtUTFp1XvGjI_C42JiAqgUVpAF1Pb9xxCVOoZMe_-7fR8Nvsl4ONmGmQPU8cUh6n1NY8Ctc_bRc91Ol0MbM773m6dliZOWAlXikJqGTZh3C1QprAuH60q7xyBPlRfVoirDgTfo0vjASb4EmrovB-h1-vBy9xi1IxMiTZlYRzbgNRlrSr1gTIixt0o7zZzimZo45oiTnmaGGe5FbLOMjycm5GCEWuOECdnJEeoWi8IfIxwcWVKjtGKMsjhTUjDLQzplJTHWazJEl8GeKWCBMm3ozTxtbd6u8RBd_3kmNavcZ0PUB4uny0ZjI22NffL79inaC4mLbBoPz1B3var8Odq1m3Veri7qh_EJXWa0gQ |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD4MFfRp6ibOawTBF-t6SZbkWR0T5xw4YW8lTVIoaDfWbeC_N6erE0EQn1JCIPCRw7n0fN8BuNRYW3Npl6dDYzzKfOVJXzvDkwLzIaF9ZsphE3wwEOOxHNbges2FsdaWzWf2Bj_Lf_lmohdYKmsL6pwNin9uMkrDYMXWWldUULdERn6l3xNQ1nbPi_IO5qW4ojCg0u8_xqiUXqRb_9_9u9D8puOR4drR7EHN5vtQ_5rHQCrzbMBL2VCXYSMzubPL52lBhhUJqiAuOHWbOPEWyVJE5YaUtXZLUKAqyxeTReEOvGGfxgcZZlMkqtuiCa_d-9Ftz6uGJngqpHzuaZexiUiFoeWUch5YLZVR1EiWyo6hxjfChmlCE2Z5pNOUBZ3ERWF-qBPDExefHMBGPsntIRBnyiJMpJIObBqlUnCqmQuotPATbZXfgguHZ4zZQBGvCM4srjCv1qgFV3-eiZNZZtMWNBDxeLpS2YgrsI9-3z6H7d7oqR_3HwaPx7DjwhixakM8gY35bGFPYUsv51kxOysfySfv8rfI |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+IEEE+ACM+4th+International+Workshop+on+Rapid+Continuous+Software+Engineering+%28RCoSE%29&rft.atitle=Exploiting+DevOps+Practices+for+Dependable+and+Secure+Continuous+Delivery+Pipelines&rft.au=Dullmann%2C+Thomas+F.&rft.au=Paule%2C+Christina&rft.au=Hoorn%2C+Andre+van&rft.date=2018-05-01&rft.pub=ACM&rft.spage=27&rft.epage=30&rft_id=info:doi/10.1145%2F3194760.3194763&rft.externalDocID=8452104 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450357456/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450357456/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450357456/sc.gif&client=summon&freeimage=true |

