Skip to content

Latest commit

 

History

History
29 lines (26 loc) · 845 Bytes

File metadata and controls

29 lines (26 loc) · 845 Bytes
description
DevSecOps: Three Magic Words Utilizing CI/CD in your deployment of packaged solutions Implementing Effective Attack and Intrusion Monitoring

DevSecOps

  • Software development operation best practices and from the operations management from a sys admin perspective
  • Guidance for keeping in production a solution in a stable, updated, and secure perspective.
  1. Introduction & Objectives
  2. Scope of Work
  3. Methodology
    1. Planning
    2. Risk Classification
  4. Continuity Analysis
    1. Integration, Delivery, and Deployment
    2. Automated Security Checks, Testing, and Verification
  5. Monitoring and Observation Analysis
    1. Manual and Automated attack detection
    2. External participants
      1. Third-Party Penetration Testing
      2. Community Bug Reporting and Bounties
  6. Conclusion