Luigi Papalia
Forensic-Aware DevSecOps Pipeline: Design, Implementation and Execution against a Purposefully Vulnerable Microservice.
Rel. Andrea Atzeni. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering), 2025
|
Preview |
PDF (Tesi_di_laurea)
- Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives. Download (2MB) | Preview |
Abstract
This thesis's main objective is the design, implementation, and demonstration of a forensic-aware DevSecOps pipeline, blending proactive DevSecOps practices with reactive forensic analysis capabilities. While existing DevSecOps approaches emphasize early vulnerability detection and the adoption of automation across the software development lifecycle, they sometimes neglect the strong forensic capabilities that are critical to successful post-incident investigations and precise threat attribution. Digital forensic analysis, on the other hand, provides powerful investigative tools, but it exists mostly in reactive cases, often in silos. This work seeks to bridge this gap by making forensic readiness an integral part of the CI/CD pipeline. The pipeline is designed by integrating cutting-edge forensic-ready elements, such as Splunk for centralized log collection, Falco for runtime threat detection in real time, and the Malware Information Sharing Platform (MISP) for threat intelligence correlation and Indicators of Compromise (IoC) identification.
The tools are integrated in a systematic way to augment static and dynamic vulnerability detection mechanisms to mitigate well-known shortcomings of traditional security practices, particularly against advanced insider threats and supply chain attacks of high complexity
Relatori
Anno Accademico
Tipo di pubblicazione
Numero di pagine
Corso di laurea
Classe di laurea
URI
![]() |
Modifica (riservato agli operatori) |
