Forem

# devsecops

Integrating security practices into the DevOps lifecycle.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Introducing to Jira Security: Best Practices For Protecting Your Data
Cover image for Introducing to Jira Security: Best Practices For Protecting Your Data

Introducing to Jira Security: Best Practices For Protecting Your Data

Comments
9 min read
DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 1
Cover image for DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 1

DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 1

32
Comments 1
6 min read
How to update cURL
Cover image for How to update cURL

How to update cURL

8
Comments
8 min read
Azure DevOps Pipeline: no secrets, no certificates

Azure DevOps Pipeline: no secrets, no certificates

6
Comments 4
6 min read
Handling Secrets with AWS Secrets Manager
Cover image for Handling Secrets with AWS Secrets Manager

Handling Secrets with AWS Secrets Manager

Comments
13 min read
GitHub Recovery Code
Cover image for GitHub Recovery Code

GitHub Recovery Code

1
Comments
4 min read
Securing Your Code with GitHub
Cover image for Securing Your Code with GitHub

Securing Your Code with GitHub

41
Comments 1
7 min read
Fixing Python Security Flaws with Bandit

Fixing Python Security Flaws with Bandit

Comments
3 min read
GitHub RepoJacking: Are You Sure Your GitHub Is Safe?
Cover image for GitHub RepoJacking: Are You Sure Your GitHub Is Safe?

GitHub RepoJacking: Are You Sure Your GitHub Is Safe?

5
Comments 1
7 min read
Codificação segura, por que todos devs precisam conhecer?

Codificação segura, por que todos devs precisam conhecer?

17
Comments 3
2 min read
Tips and tricks for Backstage Software Templates
Cover image for Tips and tricks for Backstage Software Templates

Tips and tricks for Backstage Software Templates

29
Comments
4 min read
How to strengthen security in your CI/CD pipeline
Cover image for How to strengthen security in your CI/CD pipeline

How to strengthen security in your CI/CD pipeline

3
Comments
8 min read
Docker Security: Clair
Cover image for Docker Security: Clair

Docker Security: Clair

17
Comments
6 min read
Best practices for effective attack surface analysis
Cover image for Best practices for effective attack surface analysis

Best practices for effective attack surface analysis

3
Comments
7 min read
DevSecOps with AWS- IaC at scale - Getting started.
Cover image for DevSecOps with AWS- IaC at scale - Getting started.

DevSecOps with AWS- IaC at scale - Getting started.

5
Comments
9 min read
How to use IAST to prove exploitable vulnerabilities within your first-party code
Cover image for How to use IAST to prove exploitable vulnerabilities within your first-party code

How to use IAST to prove exploitable vulnerabilities within your first-party code

Comments
10 min read
Yet another rant in favor of Kubernetes Secrets
Cover image for Yet another rant in favor of Kubernetes Secrets

Yet another rant in favor of Kubernetes Secrets

32
Comments 2
12 min read
Control your role! Kubernetes RBAC explored
Cover image for Control your role! Kubernetes RBAC explored

Control your role! Kubernetes RBAC explored

Comments
9 min read
8 tips for securing your CI/CD pipeline with Snyk
Cover image for 8 tips for securing your CI/CD pipeline with Snyk

8 tips for securing your CI/CD pipeline with Snyk

2
Comments
17 min read
Adopt Gitops Today - Here’s Why and How
Cover image for Adopt Gitops Today - Here’s Why and How

Adopt Gitops Today - Here’s Why and How

Comments
8 min read
Platform Engineering: Building Your Developer Portal with Backstage (Pt 1)
Cover image for Platform Engineering: Building Your Developer Portal with Backstage (Pt 1)

Platform Engineering: Building Your Developer Portal with Backstage (Pt 1)

Comments
10 min read
GitHub High Availability – Why It Should Never Be Considered as a Regular Backup
Cover image for GitHub High Availability – Why It Should Never Be Considered as a Regular Backup

GitHub High Availability – Why It Should Never Be Considered as a Regular Backup

Comments
5 min read
DAST in 5 Minutes (Or Less): What You Need to Know

DAST in 5 Minutes (Or Less): What You Need to Know

Comments
3 min read
Building a security-conscious CI/CD pipeline
Cover image for Building a security-conscious CI/CD pipeline

Building a security-conscious CI/CD pipeline

2
Comments
7 min read
Configurando o agente DAST ISM Veracode em servidores Linux
Cover image for Configurando o agente DAST ISM Veracode em servidores Linux

Configurando o agente DAST ISM Veracode em servidores Linux

1
Comments
3 min read
loading...