In the modern digital landscape, cybersecurity threats are a significant concern, particularly for publicly accessible computer systems. Vulnerabilities, or flaws in system design, can be exploited by malicious actors to compromise system security and integrity. This paper explor
...
In the modern digital landscape, cybersecurity threats are a significant concern, particularly for publicly accessible computer systems. Vulnerabilities, or flaws in system design, can be exploited by malicious actors to compromise system security and integrity. This paper explores the challenges of handling vulnerabilities in software dependencies from the perspective of system operators, responsible for managing and monitoring infrastructure. The investigation is structured into two main steps. First, a detailed exploration of DevOps methodologies and current vulnerability handling techniques reveals key limitations and areas for improvement. Based on these insights, a new solution is proposed to enhance system operators’ capabilities in terms of awareness, impact assessment, and actionability. To validate the proposed solution, semi- structured interviews were conducted with ten experienced software engineers. The analysis of these interviews, using grounded theory methods, helped to refine the proposed system’s concepts and assess its potential impact on industry practices. In the second step, a fully functional prototype was developed, featuring the ability to monitor and mitigate vulnerability triggers in Java services through instrumentation. The evaluation of the prototype shows that the proposed solution effectively increases the granularity of vulnerability handling and is feasible for practical implementation from the resource utilization perspective.