UsefulLinks
Computer Science
DevOps and SRE
Continuous Integration and Continuous Delivery (CI/CD)
1. Introduction to CI/CD
2. Foundations of Version Control
3. Continuous Integration Principles and Practices
4. CI/CD Pipeline Architecture
5. Automated Testing in CI/CD
6. Continuous Delivery and Deployment
7. Infrastructure and Tooling
8. Security in CI/CD (DevSecOps)
9. Monitoring and Observability
10. Database CI/CD
11. Advanced CI/CD Practices
12. Troubleshooting and Problem Resolution
13. Organizational Adoption and Change Management
14. Future Trends and Emerging Practices
8.
Security in CI/CD (DevSecOps)
8.1.
DevSecOps Principles
8.1.1.
Shifting Security Left
8.1.1.1.
Integrating Security Early
8.1.1.2.
Developer Security Training
8.1.1.3.
Security as Code
8.1.2.
Security Automation
8.1.2.1.
Automated Security Testing
8.1.2.2.
Security Policy Enforcement
8.1.2.3.
Compliance Automation
8.1.3.
Continuous Security Monitoring
8.1.3.1.
Runtime Security
8.1.3.2.
Threat Detection
8.1.3.3.
Incident Response
8.2.
Security Testing in Pipelines
8.2.1.
Static Application Security Testing
8.2.1.1.
Source Code Scanning
8.2.1.2.
Integration with CI/CD
8.2.1.3.
SAST Tools and Configuration
8.2.2.
Dynamic Application Security Testing
8.2.2.1.
Runtime Vulnerability Detection
8.2.2.2.
DAST Tools and Integration
8.2.2.3.
API Security Testing
8.2.3.
Software Composition Analysis
8.2.3.1.
Dependency Vulnerability Scanning
8.2.3.2.
License Compliance
8.2.3.3.
Supply Chain Security
8.2.4.
Infrastructure Security Testing
8.2.4.1.
Infrastructure as Code Scanning
8.2.4.2.
Container Image Scanning
8.2.4.3.
Cloud Configuration Assessment
8.3.
Secret Management
8.3.1.
Secret Management Principles
8.3.1.1.
Least Privilege Access
8.3.1.2.
Secret Rotation
8.3.1.3.
Audit and Compliance
8.3.2.
Secret Storage Solutions
8.3.2.1.
HashiCorp Vault
8.3.2.2.
AWS Secrets Manager
8.3.2.3.
Azure Key Vault
8.3.2.4.
Kubernetes Secrets
8.3.3.
Secret Management in Pipelines
8.3.3.1.
Secure Secret Injection
8.3.3.2.
Environment-Specific Secrets
8.3.3.3.
Secret Scanning in Code
8.4.
Pipeline Security
8.4.1.
Pipeline Access Control
8.4.1.1.
Authentication and Authorization
8.4.1.2.
Role-Based Access Control
8.4.1.3.
Audit Logging
8.4.2.
Secure Pipeline Configuration
8.4.2.1.
Pipeline Hardening
8.4.2.2.
Resource Isolation
8.4.2.3.
Network Security
8.4.3.
Supply Chain Security
8.4.3.1.
Dependency Management
8.4.3.2.
Build Environment Security
8.4.3.3.
Artifact Integrity
Previous
7. Infrastructure and Tooling
Go to top
Next
9. Monitoring and Observability