Application security automation in development
Mike Kennedy,
Chris Perkins,
Maria Brown and
Kori Prins
Additional contact information
Mike Kennedy: Medtronic Global Security Office, Medtronic Mounds View Campus, USA
Chris Perkins: Medtronic Global Security Office, Medtronic Mounds View Campus, USA
Maria Brown: Medtronic Global Security Office, Medtronic Tempe Campus, USA
Kori Prins: Medtronic Global Security Office, Medtronic Mounds View Campus, USA
Cyber Security: A Peer-Reviewed Journal, 2022, vol. 5, issue 3, 216-226
Abstract:
Automated security services can provide on-demand resources that are easily adopted by development teams. To save time and money, application security should be incorporated as early as possible in the application development process. Security requirements are the earliest opportunity to build a secure foundation. Using automation, security requirements can be aligned to system and project attributes and used as a foundation for additional security activities such as secure coding examples and security testing. Later in the development process, automated testing services provide development teams with vulnerability scanning options, depending on whether legacy or modern development practices are used. Legacy development projects can benefit from on-demand source code scanning that does not require tool set-up or configuration. Modern development processes are a better fit for incorporating security testing in automated build-and-test pipelines using working example scripts. When created with development team needs in mind, automated application security services can be valuable resources for development teams that drive better security outcomes. This paper will discuss an approach to building and delivering consumable development security services to drive better security.
Keywords: application security-as-a-service; automation; best practices; security pipeline; security requirements; security testing (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2022
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/6866/download/ (application/pdf)
https://hstalks.com/article/6866/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2022:v:5:i:3:p:216-226
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().