EconPapers    
Economics at your fingertips  
 

Securing identities in software development life cycles

Maya Neelakandhan, Guruprasad Ramprakash and Deepika Gautam
Additional contact information
Maya Neelakandhan: BlueFlag Security, USA
Guruprasad Ramprakash: BlueFlag Security, USA
Deepika Gautam: Co-Founder/Head of Security Engineering and Strategy, Aplima Solutions, USA

Cyber Security: A Peer-Reviewed Journal, 2025, vol. 9, issue 2, 139-148

Abstract: Security within the software development life cycle (SDLC) has traditionally focused on safeguarding code — through secret scanning, open-source package vetting, and code analysis. While this has strengthened application-level security, the assumption that code security alone is sufficient to prevent breaches has proven inadequate. This paper explores the processes, tools, and best practices involved in the code-to-cloud journey, with a particular focus on a frequently overlooked aspect of SDLC: identity management, encompassing both human developers and non-human identities. Through a case study, it demonstrates why identity threats must be treated with the same urgency as code and infrastructure vulnerabilities. The paper presents a framework for establishing a secure software development process, offering end-to-end protection that includes both tooling and identity governance. This article is also included in The Business & Management Collection which can be accessed at https://hstalks.com/business/.

Keywords: SDLC security; CI/CD best practices; identity security; insider threat; source code breaches; DevSecOps (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/10270/download/ (application/pdf)
https://hstalks.com/article/10270/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2025:v:9:i:2:p:139-148

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-10-26
Handle: RePEc:aza:csj000:y:2025:v:9:i:2:p:139-148