Infrastructure-as-code Architecture Decision Compliance
Infrastructure-as-code Architecture Decision Compliance
DACH: Österreich - Deutschland - Schweiz
Disciplines
Computer Sciences (100%)
Keywords
-
Cloud Computing,
Continuous Delivery,
Infrastructure-as-code,
Software-Architecture,
DevOps
Infrastructure-as-code (IaC) is a software engineering method that helps practitioners in computer science to automatically provision and manage IT infrastructures at scale. If provisioning and management are done manually, they are costly and error prone. The promise of IaC is easy, rapid, secure, reliable, and repeatable IT infrastructure provisioning and management. Unfortunately, IAC techniques and methods used today are highly complex. This leads to low quality, high risks, and high costs in IaC design and development. The project has the objective to develop foundational concepts and methods to address this problem. The project aims to develop new computer science models and methods as foundations for tackling the complexity of large-scale IaC architectures. It further aims to improve quality through rigorous specifications which enable compliance to architectural design decisions, derived from established patterns. Design decision and patterns are established computer science methods to describe and specify established practices. So far, in the scientific literature no effort to define compliance to IaC patterns using architectural design decisions has been attempted. Although IaC has been used as a tool for continuous improvement of a software system, e.g. in cloud applications, the development of the IaC architecture itself has not been sufficiently investigated in the literature. Given the wide use of IaC in practice and the enormous complexity of existing IaC architectures in large implementations, it is likely that often suboptimal decisions are made, leading to serious design problems. This problem has not yet been addressed by major research efforts and requires new basic research.
The IaC2 research project aimed to improve the management of IT infrastructures by focusing on Infrastructure-as-Code (IaC), a modern method that uses code to automate the setup and operation of IT systems. This approach eliminates manual processes and ensures faster, more secure, and more standardized deployments. However, as IaC systems grow in size and complexity, hidden design issues often arise, leading to higher costs, risks, and maintenance issues. The IaC2 project aimed to overcome these challenges by developing tools and methods to improve the quality, maintainability, and security of IaC systems. A key achievement of the project is the development of novel techniques for identifying and fixing common design problems in IaC systems. These issues in the system structure often do not cause immediate problems but can lead to serious problems over time. The researchers also worked to identify best practices (or patterns) to help developers build better systems from the start. By automating these processes, the project is helping to reduce the manual effort required to maintain complex IT infrastructures, making them easier, of higher quality, and cheaper to manage. Improving security in IaC-based systems was a key focus of the research. For example, the team has developed automated methods to ensure that best security practices are followed when setting up infrastructures and deployment systems, such as protecting sensitive data, managing user identities, and ensuring secure communication between IaC system components. These advances help organizations avoid vulnerabilities in IaC systems and keep these systems secure. The project also explored ways to manage the complexity of IaC systems. The complex target systems used included microservice systems, which consist of independent services and are often managed with IaC today. By studying real systems and developing automated tools, the researchers have created novel methods to automatically measure and improve the alignment of infrastructure design with intended goals to ensure that systems are as high quality, well-structured, and secure as possible. The results of IaC2 were validated through case studies, experiments, and collaboration with technical experts. The resulting data sets and the necessary code were made openly available to ensure the reproducibility of the results. These innovations pave the way for higher quality, more secure, and easier-to-maintain IT systems and infrastructures, enabling organizations to save time, reduce costs, and focus on innovation. For those who manage large IT infrastructures, the results of this research provide novel concepts, tools, and methods to manage the complexity of modern IaC technologies safely.
- Universität Wien - 100%
- Frank Leymann, Universität Stuttgart - Germany
Research Output
- 20 Citations
- 19 Publications
- 15 Datasets & models
- 12 Software
-
2024
Title Cloud Programming Languages and Infrastructure from Code: An Empirical Study DOI 10.1145/3687997.3695643 Type Conference Proceeding Abstract Author Simhandl G Pages 143-156 -
2024
Title On the Understandability of Design-Level Security Practices in Infrastructure-as-Code Scripts and Deployment Architectures DOI 10.1145/3691630 Type Journal Article Author Lueger N Journal ACM Transactions on Software Engineering and Methodology -
2024
Title Detection Strategies for Microservice Security Tactics DOI 10.1109/tdsc.2023.3276487 Type Journal Article Author Queval P Journal IEEE Transactions on Dependable and Secure Computing -
2023
Title Microservice Security Metrics for Secure Communication, Identity Management, and Observability DOI 10.1145/3532183 Type Journal Article Author Queval P Journal ACM Transactions on Software Engineering and Methodology -
2023
Title Detecting and Resolving Coupling-Related Infrastructure as Code Based Architecture Smells in Microservice Deployments DOI 10.5281/zenodo.7737931 Type Conference Proceeding Abstract Author Ntentos E Link Publication -
2023
Title Cost-Aware Multifaceted Reconfiguration of Service- and Cloud-Based Dynamic Routing Applications DOI 10.5281/zenodo.7919227 Type Conference Proceeding Abstract Author Amiri A Link Publication -
2023
Title Extracting theArchitecture ofMicroservices: An Approach forExplainability andTraceability; In: Software Architecture - 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18-22, 2023, Proceedings DOI 10.1007/978-3-031-42592-9_24 Type Book Chapter Publisher Springer Nature Switzerland -
2023
Title Tool Support fortheAdaptation ofQuality ofService Trade-Offs inService- and Cloud-Based Dynamic Routing Architectures; In: Software Architecture - 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18-22, 2023, Proceedings DOI 10.1007/978-3-031-42592-9_2 Type Book Chapter Publisher Springer Nature Switzerland -
2022
Title Avoiding Excessive Data Exposure Through Microservice APIs DOI 10.1007/978-3-031-16697-6_1 Type Book Chapter Author Genfer P Publisher Springer Nature Pages 3-18 -
2021
Title Evaluating and Improving Microservice Architecture Conformance to Architectural Design Decisions DOI 10.5281/zenodo.5724082 Type Conference Proceeding Abstract Author Ntentos E Link Publication -
2021
Title Detector-based Component Model Abstraction for Microservice-Based Systems DOI 10.5281/zenodo.5724109 Type Journal Article Author Ntentos E Link Publication -
2021
Title Identifying Domain-Based Cyclic Dependencies in Microservice APIs Using Source Code Detectors DOI 10.5281/zenodo.5094522 Type Conference Proceeding Abstract Author Genfer P Link Publication -
2022
Title On Unifying the Compliance Management of Applications Based on IaC Automation DOI 10.5281/zenodo.7143512 Type Conference Proceeding Abstract Author Breitenbücher U Link Publication -
2022
Title Assessing Architecture Conformance to Security-Related Practices in Infrastructure as Code Based Deployments DOI 10.5281/zenodo.6694962 Type Conference Proceeding Abstract Author Ntentos E Link Publication -
2023
Title Compliance Management of IaC-Based Cloud Deployments During Runtime DOI 10.1145/3603166.3632135 Type Conference Proceeding Abstract Author Falazi G Pages 1-11 -
2022
Title On Unifying the Compliance Management of Applications Based on IaC Automation DOI 10.1109/icsa-c54293.2022.00050 Type Conference Proceeding Abstract Author Falazi G Pages 226-229 Link Publication -
2022
Title Assessing Architecture Conformance to Security-Related Practices in Infrastructure as Code Based Deployments DOI 10.1109/scc55611.2022.00029 Type Conference Proceeding Abstract Author Ntentos E Pages 123-133 Link Publication -
2022
Title Assessing Architecture Conformance to Coupling-Related Infrastructure-as-Code Best Practices: Metrics and Case Studies DOI 10.5281/zenodo.6801247 Type Conference Proceeding Abstract Author Ntentos E Link Publication -
2021
Title Identifying Domain-Based Cyclic Dependencies in Microservice APIs Using Source Code Detectors DOI 10.1007/978-3-030-86044-8_15 Type Book Chapter Author Genfer P Publisher Springer Nature Pages 207-222
-
2021
Link
Title Detector-based Component Model Abstraction for Microservice-Based Systems DOI 10.5281/zenodo.5235931 Type Database/Collection of data Public Access Link Link -
2021
Link
Title Evaluating and Improving Microservice Architecture Conformance to Architectural Design Decisions DOI 10.5281/zenodo.5549978 Type Database/Collection of data Public Access Link Link -
2024
Link
Title On the Understandability of Design-Level Security Practices in Infrastructure-as-Code Scripts and Deployment Architectures DOI 10.5281/zenodo.10958738 Type Database/Collection of data Public Access Link Link -
2024
Link
Title Data of the Study: "Cloud Programming Languages and Infrastructure From Code: An Empirical Study" DOI 10.5281/zenodo.12622489 Type Database/Collection of data Public Access Link Link -
2023
Link
Title Online Artifact: Cost-Aware Multifaceted Reconfiguration of Service- and Cloud-Based Dynamic Routing Applications DOI 10.5281/zenodo.7771327 Type Database/Collection of data Public Access Link Link -
2023
Link
Title Online Artifact: Tool Support for the Adaptation of Quality of Service Trade-Offs in Service- and Cloud-Based Dynamic Routing Architectures DOI 10.5281/zenodo.7944822 Type Database/Collection of data Public Access Link Link -
2023
Link
Title Qualitative Interview Study to Assess the Usefulness of the IaC-based Application Compliance Management Framework (IACMF) DOI 10.5281/zenodo.8073225 Type Database/Collection of data Public Access Link Link -
2023
Link
Title Data and Source Code of the study: "Detecting and Resolving Coupling-Related Infrastructure as Code Based Architecture Smells in Microservice Deployments" DOI 10.5281/zenodo.7664738 Type Database/Collection of data Public Access Link Link -
2023
Link
Title Extracting the Architecture of Microservices: An Approach for Explainability and Traceability DOI 10.5281/zenodo.8100927 Type Database/Collection of data Public Access Link Link -
2023
Link
Title Microservice Security Detectors & Metrics & Detection Strategies: Dataset DOI 10.5281/zenodo.7929312 Type Database/Collection of data Public Access Link Link -
2023
Link
Title Source Code and Interviews with Industry Experts Regarding Compliance Management of IaC-Based Deployments During Runtime DOI 10.5281/zenodo.8252989 Type Database/Collection of data Public Access Link Link -
2022
Link
Title Data and Source Code of the study: Assessing Architecture Conformance to Security-Related Practices in Infrastructure as Code Based Deployments DOI 10.5281/zenodo.6559384 Type Database/Collection of data Public Access Link Link -
2022
Link
Title Source code detectors and data for calculating excessive data exposure in microservice APIs DOI 10.5281/zenodo.6700020 Type Database/Collection of data Public Access Link Link -
2022
Link
Title Microservice Security Metrics: Dataset DOI 10.5281/zenodo.6424721 Type Database/Collection of data Public Access Link Link -
2022
Link
Title Data and Source Code of the study: Assessing Architecture Conformance to Coupling-Related Infrastructure-as-Code Best Practices: Metrics and Case Studies DOI 10.5281/zenodo.6696129 Type Database/Collection of data Public Access Link Link
-
2023
Link
Title Source Code and Interviews with Industry Experts Regarding Compliance Management of IaC-Based Deployments During Runtime DOI 10.5281/zenodo.8252989 Link Link -
2023
Link
Title Microservice Security Detectors, Metrics, Detection Strategies: Dataset and Source Code DOI 10.5281/zenodo.7929312 Link Link -
2023
Link
Title Online Artifact: Tool Support for the Adaptation of Quality of Service Trade-Offs in Service- and Cloud-Based Dynamic Routing Architectures DOI 10.5281/zenodo.7944822 Link Link -
2023
Link
Title Data and Source Code of the study: "Detecting and Resolving Coupling-Related Infrastructure as Code Based Architecture Smells in Microservice Deployments" DOI 10.5281/zenodo.7664738 Link Link -
2023
Link
Title Online Artifact: Cost-Aware Multifaceted Reconfiguration of Service- and Cloud-Based Dynamic Routing Applications DOI 10.5281/zenodo.7771327 Link Link -
2022
Link
Title Data and Source Code of the study: Assessing Architecture Conformance to Coupling-Related Infrastructure-as-Code Best Practices: Metrics and Case Studies DOI 10.5281/zenodo.6696129 Link Link -
2022
Link
Title Microservice Security Metrics: Dataset and Source Code DOI 10.5281/zenodo.6424721 Link Link -
2022
Link
Title Data and Source Code of the study: Assessing Architecture Conformance to Security-Related Practices in Infrastructure as Code Based Deployments DOI 10.5281/zenodo.6559384 Link Link -
2022
Link
Title Source code detectors and data for calculating excessive data exposure in microservice APIs DOI 10.5281/zenodo.6700020 Link Link -
2022
Link
Title CodeableModels Link Link -
2021
Link
Title Evaluating and Improving Microservice Architecture Conformance to Architectural Design Decisions DOI 10.5281/zenodo.5549978 Link Link -
2021
Link
Title Detector-based Component Model Abstraction for Microservice-Based Systems DOI 10.5281/zenodo.5235931 Link Link