Skip to content

Commit

Permalink
CI/CD Security Cheatsheet | fix typo "o" --> "of" && "enviornment" --…
Browse files Browse the repository at this point in the history
…> "environment" (#1370)

* fix typo "o" --> "of"

* fix typo Enviornment --> Environment
  • Loading branch information
garrettpfoy committed Apr 3, 2024
1 parent 72be6eb commit 4a8af50
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions cheatsheets/CI_CD_Security_Cheat_Sheet.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,9 +48,9 @@ CI/CD environments allow for code to be pushed to a repository and then deployed
- Carefully weigh the risk against the benefits of allowing ephemeral contributors. Limit the number and permissions of external contributions when possible.
- Enable MFA where available

### Pipeline and Execution Enviornment
### Pipeline and Execution Environment

In addition to SCM systems, it is imperative that the automation servers responsible for running the pipelines are also configured securely. Examples o these technologies include Travis, TeamCity, Jenkins, and CircleCI. While the exact hardening process will vary according to the specific platform used, some general best practices include:
In addition to SCM systems, it is imperative that the automation servers responsible for running the pipelines are also configured securely. Examples of these technologies include Travis, TeamCity, Jenkins, and CircleCI. While the exact hardening process will vary according to the specific platform used, some general best practices include:

- Perform builds in appropriately isolated nodes (see Jenkins example [here](https://www.jenkins.io/doc/book/security/controller-isolation/))
- Ensure communication between the SCM and CI/CD platform is secured using widely accepted protocols such as TLS 1.2 or greater.
Expand Down

0 comments on commit 4a8af50

Please sign in to comment.