Главная
Study mode:
on
1
Intro
2
Background
3
Common Question
4
The Rugged Manifesto
5
Common Pitfalls
6
What went wrong?
7
Current State Assessment
8
Assessment Plan
9
Assessment Process
10
Identify Stakeholders
11
Assessment - Developer
12
Assessment - Quality Assurance
13
Assessment - Deployment / Release
14
Assessment - IT Operations
15
Assessment - Information Security
16
Assessment - Technology Stack
17
Identify Metrics and Measurement
18
Feedback to the Team
19
People
20
Platform
21
Rugged Continued ...
22
Rugged DevOps on...
23
Continuous Integration (CI) Model
Description:
Explore requirements gathering for successful DevSecOps pipeline implementation in this 40-minute conference talk from AppSec EU 2017. Learn how to assess current states, identify productivity bottlenecks, determine training needs, establish metrics, and implement monitoring strategies. Discover considerations and approaches for creating a security-first automated development pipeline tailored to your organization's unique requirements, motivations, and technologies. Gain insights into integrating secure coding and verification practices throughout the software development lifecycle, addressing key aspects such as security policy, development platforms, application technical stacks, and cross-team involvement. Understand common pitfalls, the Rugged Manifesto, and strategies for assessing various stakeholders including developers, quality assurance, deployment/release teams, IT operations, and information security. Delve into identifying appropriate metrics, providing feedback, and implementing a Continuous Integration (CI) model for a more secure and efficient software development process. Read more

Requirements Gathering for Successful DevSecOps Pipeline - AppSec EU 2017

OWASP Foundation
Add to list
0:00 / 0:00