Securing software development using developer access control

dc.contributor.advisorMotara, Yusuf
dc.contributor.authorOngers, Grant
dc.date.accessioned2026-03-04T14:40:00Z
dc.date.issued2020
dc.description.abstractThis research is aimed at software development companies and highlights the unique information security concerns in the context of a non-malicious software developer's work environment; and furthermore explores an application driven solution which focuses specifically on providing developer environments with access control for source code repositories. In order to achieve that, five goals were defined as discussed in section 1.3. The application designed to provide the developer environment with access control to source code repositories was modelled on lessons taken from the principles of Network Access Control (NAC), Data Loss Prevention (DLP), and Google's BeyondCorp (GBC) for zero-trust end-user computing. The intention of this research is to provide software developers with maximum access to source code without compromising Confidentiality, as per the Confidentiality, Integrity and Availability (CIA) triad. Employing data gleaned from examining the characteristics of DLP, NAC, and Beyond- Corp"”proof-of-concept code was developed to regulate access to the developer's environment and source code. The system required sufficient flexibility to support the diversity of software development environments. In order to achieve this, a modular design was selected. The system comprised a client side agent and a plug-in-ready server component. The client side agent mounts and dismounts encrypted volumes containing source code. Furthermore, it provides the server with information of the client that is demanded by plug-ins. The server side service provided encryption keys to facilitate the mounting of the volumes and, through plug-ins, asked questions of the client agent to determine whether access should be granted. The solution was then tested with integration and system testing. There were plans to have it used by development teams who were then to be surveyed as to their view on the proof of concept but this proved impossible. The conclusion provides a basis by which organisations that develop software can better balance the two corners of the CIA triad most often in conflict: Confidentiality in terms of their source code against the Availability of the same to developers.
dc.description.degreeMaster's thesis
dc.description.degreeMSc
dc.format.extent186 pages
dc.format.mimetypeapplication/pdf
dc.identifier.otherhttp://hdl.handle.net/10962/149022
dc.identifier.urihttps://researchrepository.ru.ac.za/handle/123456789/7512
dc.languageEnglish
dc.publisherRhodes University, Faculty of Science, Department of Computer Science
dc.rightsOngers, Grant
dc.subjectComputer software -- Development
dc.subjectComputers -- Access control
dc.subjectComputer security -- Software
dc.subjectComputer networks -- Security measures
dc.subjectSource code (Computer science)
dc.subjectPlug-ins (Computer programs)
dc.subjectData encryption (Computer science)
dc.subjectNetwork Access Control
dc.subjectData Loss Prevention
dc.subjectGoogle's BeyondCorp
dc.subjectConfidentiality, Integrity and Availability (CIA) triad
dc.titleSecuring software development using developer access control
dc.typeAcademic thesis

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Securing_software_development_using_developer_acce_vital_38796.pdf
Size:
1.6 MB
Format:
Adobe Portable Document Format