-
Notifications
You must be signed in to change notification settings - Fork 427
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DevOps and Security - DevSecOps #18
Comments
Principles:
|
Intrusion detection: https://en.wikipedia.org/wiki/Intrusion_detection_system (signature based, anomaly detection) |
Very good set of pointers: https://www.sqreen.io/checklists/devops-security-checklist |
Mapping security design principles to devops on one axis, mapping security concepts/mechanisms to devops on another. |
Dynamic and short lived secrets for authorisation, see for example AWS IAM Roles are implemented or Hashicorp Vault. |
Open Source: Simplifying Serverless Secrets |
Vault and kubernetes |
CI/CD enables automated program hardening: Operating system protection through program evolution, Fred Cohen, 1993 |
Check your repos... Crypto-coin-stealing code sneaks into fairly popular NPM lib (2m downloads per week) |
7 Tips for Container and Kubernetes Security |
Microservices Hierarchy of Needs |
On The Relation Between Outdated Docker Containers, Severity Vulnerabilities and Bugs. |
Reproducible builds |
added wikipedia references in the top post of this thread. |
Security standards: NIST800 53, ISO27000 |
Super Secret Dynamic Secrets with Vault |
Vault |
InSpec |
On the Relation between Outdated Docker Containers, Severity Vulnerabilities, and Bugs. |
On the Impact of Outdated and Vulnerable Javascript Packages in Docker Images. |
Kubernetes security: 5 mistakes to avoid |
security for containers |
Two interesting papers on container security / vulnerabilities analysis: |
The Three Rs of Enterprise Security: Rotate, Repave, and Repair |
A framework to secure the integrity of software supply chains |
Attack graph generation for microservice architecture |
It’s Time to Get Hip to the SBOM |
The steady project addresses the OWASP Top 10 security risk A9, Using Components with Known Vulnerabilities |
SpiceDB is a open source Zanzibar-inspired database that stores, computes, and validates fine grained permissions. |
|
Google Cloud Key Management |
OWASP Top 10 CI/CD Security Risks |
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms |
|
A Static Analysis Platform for Investigating Security Trends in Repositories. |
|
Reverse Engineering the Tesla Firmware Update Process |
Scan (skæn) is an open-source security audit tool for modern DevOps teams |
|
GitGuardian is a developer-first solution scanning GitHub activity in real-time for API secret tokens, database credentials |
|
Securing the Supply Chain for Your Java Applications By Thomas Vitale. Devoxx 2023 |
Where does your software (really) come from? |
Azure Sentinel |
poutine is a security scanner that detects misconfigurations and vulnerabilities in the build pipelines of a repository |
docker-bench: checks for dozens of common best-practices around deploying Docker containers in production |
Coana Coana's SCA with Reachability Analysis allows you to safely disregard unreachable vulnerabilities and easily patch the ones that matter. |
Wikipedia references:
The text was updated successfully, but these errors were encountered: