description |
---|
DevSecOps: Three Magic Words Utilizing CI/CD in your deployment of packaged solutions Implementing Effective Attack and Intrusion Monitoring |
- Software development operation best practices and from the operations management from a sys admin perspective
- Guidance for keeping in production a solution in a stable, updated, and secure perspective.
- Introduction & Objectives
- Scope of Work
- Methodology
-
- Planning
- Risk Classification
- Continuity Analysis
-
- Integration, Delivery, and Deployment
- Automated Security Checks, Testing, and Verification
- Monitoring and Observation Analysis
-
- Manual and Automated attack detection
- External participants
-
- Third-Party Penetration Testing
- Community Bug Reporting and Bounties
- Conclusion