Please use this identifier to cite or link to this item: http://hdl.handle.net/10071/27228
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAndrei-Cristian, I.-
dc.contributor.authorGasiba, T. E.-
dc.contributor.authorZhao, T.-
dc.contributor.authorLechner, U.-
dc.contributor.authorPinto-Albuquerque, M.-
dc.contributor.editorWang, G., Choo, K.-K. R., Ko, R. K. L., Xu, Y., and Crispo, B.-
dc.date.accessioned2023-01-14T22:41:51Z-
dc.date.available2023-01-14T22:41:51Z-
dc.date.issued2022-
dc.identifier.citationIosif, A. C., Gasiba, T. E., Zhao, T., Lechner, U., & Pinto-Albuquerque, M. (2022). A large-scale study on the security vulnerabilities of cloud deployments. Em: G. Wang, K. K. R. Choo, R. K. L. Ko, Y. Xu, B. Crispo (Eds.). Ubiquitous Security. UbiSec 2021. Communications in Computer and Information Science, vol. 1557 (pp. 171-188). Springer. https://doi.org/10.1007/978-981-19-0468-4_13-
dc.identifier.isbn978-981-19-0468-4-
dc.identifier.issn1865-0929-
dc.identifier.urihttp://hdl.handle.net/10071/27228-
dc.description.abstractAs cloud deployments are becoming ubiquitous, the rapid adoption of this new paradigm may potentially bring additional cyber security issues. It is crucial that practitioners and researchers pose questions about the current state of cloud deployment security. By better understanding existing vulnerabilities, progress towards a more secure cloud can be accelerated. This is of paramount importance especially with more and more critical infrastructures moving to the cloud, where the consequences of a security incident can be significantly broader. This study presents a data-centric approach to security research – by using three static code analysis tools and scraping the internet for publicly available codebases, a footprint of the current state of open-source infrastructure-as-code repositories can be achieved. Out of the scraped 44485 repository links, the study is concentrated on 8256 repositories from the same cloud provider, across which 292538 security violations have been collected. Our contributions consist of: understanding on existing security vulnerabilities of cloud deployments, contributing a list of Top Guidelines for practitioners to follow to securely deploy systems in the cloud, and providing the raw data for further studies.eng
dc.language.isoeng-
dc.publisherSpringer-
dc.relationinfo:eu-repo/grantAgreement/FCT/6817 - DCRRNI ID/UIDB%2F04466%2F2020/PT-
dc.relationinfo:eu-repo/grantAgreement/FCT/6817 - DCRRNI ID/UIDP%2F04466%2F2020/PT-
dc.relation.ispartofUbiquitous Security. UbiSec 2021. Communications in Computer and Information Science-
dc.rightsopenAccess-
dc.subjectCloudeng
dc.subjectSecurityeng
dc.subjectIndustryeng
dc.subjectCritical infrastructureseng
dc.subjectAwarenesseng
dc.subjectInfrastructure as codeeng
dc.subjectTerraformeng
dc.subjectSecure codingeng
dc.titleA large-scale study on the security vulnerabilities of cloud deploymentseng
dc.typeconferenceObject-
dc.event.title1st International Conference on Ubiquitous Security, UbiSec 2021-
dc.event.typeConferênciapt
dc.event.locationGuangzhoueng
dc.event.date2021-
dc.pagination171 - 188-
dc.peerreviewedyes-
dc.volume1557-
dc.date.updated2023-01-14T22:40:54Z-
dc.description.versioninfo:eu-repo/semantics/acceptedVersion-
dc.identifier.doi10.1007/978-981-19-0468-4_13-
dc.subject.fosDomínio/Área Científica::Ciências Naturais::Matemáticaspor
dc.subject.fosDomínio/Área Científica::Ciências Naturais::Ciências da Computação e da Informaçãopor
iscte.identifier.cienciahttps://ciencia.iscte-iul.pt/id/ci-pub-89353-
iscte.alternateIdentifiers.wosWOS:000772155500013-
iscte.alternateIdentifiers.scopus2-s2.0-85126194912-
Appears in Collections:ISTAR-CRI - Comunicações a conferências internacionais

Files in This Item:
File SizeFormat 
conferenceObject_89353.pdf417,98 kBAdobe PDFView/Open


FacebookTwitterDeliciousLinkedInDiggGoogle BookmarksMySpaceOrkut
Formato BibTex mendeley Endnote Logotipo do DeGóis Logotipo do Orcid 

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.