{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T13:05:39Z","timestamp":1769087139304,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,14]]},"DOI":"10.1109\/cloudcom67567.2025.11331450","type":"proceedings-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T20:37:16Z","timestamp":1768941436000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Securing Cloud-Native Applications via Infrastructure as Code and DevOps"],"prefix":"10.1109","author":[{"given":"Abdelali","family":"Khatibi","sequence":"first","affiliation":[{"name":"Technical University of Denmark,SPTAGE Lab,Denmark"}]},{"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[{"name":"Technical University of Denmark,SPTAGE Lab,Denmark"}]},{"given":"Wenjuan","family":"Li","sequence":"additional","affiliation":[{"name":"The Education University of Hong Kong,Department of Mathematics and Information Technology,Hong Kong SAR"}]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology,Department of Electrical and Computer Engineering,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2024.3352734"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2025.3547563"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2025.3578557"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3159001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3349648"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN52240.2021.9522356"},{"key":"ref7","volume-title":"The State of Kubernetes Security in 2022."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2024.3374798"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-025-09937-w"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3417"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/cnsm59352.2023.10327839"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110479"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-024-00681-1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2024.3358823"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599465"},{"key":"ref16","volume-title":"What is DevOps? - Amazon Web Services (AWS)."},{"key":"ref17","volume-title":"10 Kubernetes Security Context settings you should understand Snyk."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741964"},{"key":"ref19","volume-title":"GoogleCloudPlatformlmicroservices-demo: Sample cloud-native ap-plication with 1 0 micro services showcasing Kubernetes, Istio, gRPC and OpenCensus."},{"key":"ref20","volume-title":"Prototype Pollution in protobufjs CVE-2022\u201325878-Snyk."},{"key":"ref21","volume-title":"NVD - CVE-2019\u201315847."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103713"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00687-x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3248259"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108884"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.013.2100768"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2021BCP0013"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118545"}],"event":{"name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","location":"Shenzhen, China","start":{"date-parts":[[2025,11,14]]},"end":{"date-parts":[[2025,11,16]]}},"container-title":["2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11330195\/11331311\/11331450.pdf?arnumber=11331450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T07:17:39Z","timestamp":1768979859000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11331450\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/cloudcom67567.2025.11331450","relation":{},"subject":[],"published":{"date-parts":[[2025,11,14]]}}}