Securing identities in software development life cycles
Maya Neelakandhan,
Guruprasad Ramprakash and
Deepika Gautam
Additional contact information
Maya Neelakandhan: BlueFlag Security, USA
Guruprasad Ramprakash: BlueFlag Security, USA
Deepika Gautam: Co-Founder/Head of Security Engineering and Strategy, Aplima Solutions, USA
Cyber Security: A Peer-Reviewed Journal, 2025, vol. 9, issue 2, 139-148
Abstract:
Security within the software development life cycle (SDLC) has traditionally focused on safeguarding code — through secret scanning, open-source package vetting, and code analysis. While this has strengthened application-level security, the assumption that code security alone is sufficient to prevent breaches has proven inadequate. This paper explores the processes, tools, and best practices involved in the code-to-cloud journey, with a particular focus on a frequently overlooked aspect of SDLC: identity management, encompassing both human developers and non-human identities. Through a case study, it demonstrates why identity threats must be treated with the same urgency as code and infrastructure vulnerabilities. The paper presents a framework for establishing a secure software development process, offering end-to-end protection that includes both tooling and identity governance. This article is also included in The Business & Management Collection which can be accessed at https://hstalks.com/business/.
Keywords: SDLC security; CI/CD best practices; identity security; insider threat; source code breaches; DevSecOps (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/10270/download/ (application/pdf)
https://hstalks.com/article/10270/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2025:v:9:i:2:p:139-148
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().