0% found this document useful (0 votes)
115 views3 pages

Presentation 1

Developers collaborate with IT operations and information security teams to harden artifacts like container images and virtual machine images. Security is integrated into the development process through threat modeling, code reviews, and scans for security issues. Artifacts must pass security criteria to promote through environments like development, QA, staging, and production, and monitoring continues to detect security drift.

Uploaded by

abishekvs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views3 pages

Presentation 1

Developers collaborate with IT operations and information security teams to harden artifacts like container images and virtual machine images. Security is integrated into the development process through threat modeling, code reviews, and scans for security issues. Artifacts must pass security criteria to promote through environments like development, QA, staging, and production, and monitoring continues to detect security drift.

Uploaded by

abishekvs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Security Hardening of Artifacts

App

Infra
Facilitates
Security
Info Sec Vulnerability of Patching Artifacts Defect Tracking System
Container Images, VM Artifacts
Collaborates

IT Ops

Reviews and Contributes


to Infra Code Promote to QA
Dev Environment
with security as acceptance criterion
Threat Modelling
Peer Code Review QA Environment
Pulls &
Code Commits
Builds
Promote to Staging
Developer Staging Environment with security as acceptance criterion
Software Component Analysis
Change to Infra / Code Incremental SAST
Security Unit/Function Test
Alert on high-risk code change
Compile build Checks
Prod Environment Baseline security assessment

Monitor Drift from Baseline Security


Smoke Test/Monkeys
DAST Scans Monitoring/Continuous
Code Scan for Security Issues
Deep SAST Scans vulnerability scans
Current on known patches and vulnerabilities ? Automated Security Attacks Red Teaming
Fuzzing Bug Bounties
Pen Testing (Out of Band)
App
Security Hardening of Artifacts
Infra
Facilitates
Security
Info Sec Vulnerability of Patching Artifacts
Defect Tracking System
Container Images, VM Artifacts
Collaborates

IT Ops

Reviews and Contributes


to Infra Code Promote to QA
Dev Environment
with security as acceptance criterion
Threat Modelling
Peer Code Review QA Environment
Pulls &
Code Commits
Builds
Promote to Staging
Developer Staging Environment with security as acceptance criterion
Software Component Analysis
Change to Infra / Code Incremental SAST
Security Unit/Function Test
Alert on high-risk code change
Compile build Checks
Prod Environment Baseline security assessment

Monitor Drift from Baseline Security


Smoke Test/Monkeys
DAST Scans Monitoring/Continuous
Code Scan for Security Issues
Deep SAST Scans vulnerability scans
Current on known patches and vulnerabilities Automated Security Attacks Red Teaming
Fuzzing Bug Bounties
Pen Testing (Out of Band)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy