Главная
Study mode:
on
1
Intro
2
Take a breath
3
Requirements interface
4
Approval process
5
Security reference architecture
6
Endtoend tests
7
Requirements tests
8
Static analysis
9
Security test coverage
10
Security requirements interface
11
Security maturity model
Description:
Explore a comprehensive approach to securing DevOps pipelines in this 43-minute LASCON conference talk. Learn why a tools-first approach often falls short and discover a risk-based methodology for enhancing application security. Understand the importance of considering business risks, threat models, and required security controls before selecting tools. Gain insights into essential security components for CD pipelines, strategies for building organizational momentum, and overcoming common challenges through industry case studies. Examine a high-level maturity model for setting goals and tracking progress in fast-paced application security programs. Delve into topics such as requirements interfaces, approval processes, security reference architectures, end-to-end testing, static analysis, and security test coverage to develop a more robust and effective DevOps security strategy.

Your Security Tools Are Just a Stop-Gap to Secure DevOps

LASCON
Add to list
0:00 / 0:00