Enhancing Infrastructure as Code (IaC) with Automated Validation for Reliable and Error-Free Deployments
Keywords:
Infrastructure As Code, Automated Validation, Deployment, ReliabilityAbstract
Infrastructure as Code (IaC) Is turned out to be a transformative practise in modern software deployment and system management which allows automation and consistency across development and production environment. Despite promise for deficient and scalable deployments, IaC has inbuilt challenge specially related to the potential for human error and difficulty to ensure reliability and correctness of configuration. The aim of this research paper is to explore the integration of automated validation technique into IaC workflow which can enhance the reliability and accuracy of infrastructure deployments.
Downloads
References
J. Klein and D. Reynolds, "Infrastructure as Code: Final Report," Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA, Tech. Rep., Dec. 2018.
A. Rahman, R. Mahdavi-Hezaveh, and L. Williams, "A Systematic Mapping Study of Infrastructure as Code Research," Information and Software Technology, vol. 108, pp. 65–77, 2019.
N. Saavedra and J. F. Ferreira, "GLITCH: Automated Polyglot Security Smell Detection in Infrastructure as Code," arXiv preprint arXiv:2205.14371, 2022.
N. Borovits et al., "DeepIaC: Deep Learning-Based Linguistic Anti-pattern Detection in IaC," arXiv preprint arXiv:2009.10801, 2020.
K. Prakasha, B. Muniyal and V. Acharya, "Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card," in IEEE Access, vol. 7, pp. 17981-18007, 2019, https://doi.org/10.1109/ACCESS.2019.2896324
J. Zhou, M. Ma and S. Sun, "A Hybrid Authentication Protocol for LTE/LTE-A Network," in IEEE Access, vol. 7, pp. 28319-28333, 2019, https://doi.org/10.1109/ACCESS.2019.2901548
A. Rahman and L. Williams, "Testing Infrastructure as Code: Why and How," in Proceedings of the IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), 2018, pp. 13–22.
S. D. Palma, D. Di Nucci, F. Palomba, and A. Zaidman, "An Exploratory Study on the Adoption of Infrastructure as Code in Open Source Projects," in Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2020, pp. 1–11.
N. Saavedra, J. F. Ferreira, and J. M. Fernandes, "Security Smells in Ansible and Chef Scripts: A Replication Study," in Proceedings of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2021, pp. 554–558.
A. Rahman, C. Parnin, and L. Williams, "The Seven Sins: Security Smells in Infrastructure as Code Scripts," in Proceedings of the IEEE/ACM International Conference on Software Engineering (ICSE), 2019, pp. 164–175.
S. Malani, J. Srinivas, A. K. Das, K. Srinathan and M. Jo, "Certificate-Based Anonymous Device Access Control Scheme for IoT Environment," in IEEE Internet of Things Journal, vol. 6, no. 6, pp. 9762-9773, Dec. 2019, https://doi.org/10.1109/JIOT.2019.2931372
A. Rahman, "Characterizing Defects in Infrastructure as Code," in Proceedings of the IEEE/ACM International Conference on Automated Software Engineering (ASE), 2020, pp. 1019–1023.
S. D. Palma, F. Palomba, D. A. Tamburri, and A. Serebrenik, "Challenges and Opportunities in Infrastructure as Code: A Survey with Industrial Practitioners," in Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2021, pp. 1–11.
P. A. Laplante and J. F. DeFranco, "Software Engineering of Safety-Critical Systems: Themes From Practitioners," in IEEE Transactions on Reliability, vol. 66, no. 3, pp. 825-836, Sept. 2017, https://doi.org/10.1109/TR.2017.2731953
S. D. Palma, F. Palomba, and A. Zaidman, "An Exploratory Study on the Relationship between Configuration Management Scripts and Infrastructure Failures," in Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2019, pp. 19–29.
A. Rahman, "A Grounded Theory Study on Assuring Quality and Security of Infrastructure as Code," in Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), 2020, pp. 1–12.
S. D. Palma, F. Palomba, D. A. Tamburri, and A. Serebrenik, "Exploring the Adoption of Infrastructure as Code Practices in Industry," in Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2020, pp. 1–11.
A. Rahman, "Characterizing Security Vulnerabilities in Infrastructure as Code," in Proceedings of the IEEE/ACM International Conference on Software Engineering (ICSE), 2021, pp. 857–869.
M. Goli, J. Stoppe and R. Drechsler, "Automated Nonintrusive Analysis of Electronic System Level Designs," in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, no. 2, pp. 492-505, Feb. 2020, https://doi.org/10.1109/TCAD.2018.2889665