Abstract:
The article analyzes modern approaches to software security, such as “shift left”, “zero trust” and “security gates”. The authors systematize the methods and means of protection, carry out a comparative analysis of their effectiveness and propose ways of their integrated application at different stages of the software life cycle. The study includes an analysis of modern scientific publications and recommendations in the field of information security, popular views and limitations of each approach. A role model, its structure and potential scenarios of application in the development of individual projects are provided. The capabilities of static and dynamic code analysis tools, supply chain protection and access control in DevSecOps processes are considered. As a result of the analysis, the main problems were identified and research was conducted, recommendations for improving the existing practice were proposed