While CI/CD pipelines play a critical role in accelerating software delivery, automation, and innovation, the fast pace of these environments can introduce security gaps that require a new set of strategies to mitigate threats
While CI/CD pipelines play a critical role in accelerating software delivery, automation, and innovation, the fast pace of these environments can introduce security gaps that require a new set of strategies to mitigate threats. Join this fireside chat on September 20th to discover the best practices for securing your CI/CD pipelines in cloud-native environments. After taking a look at common CI/CD threats and the attack surface, we'll walk through hardening approaches related to: Authentication and access control Dev environment – such as keeping tools, software, and OS up to dateDevelopment – including embedding security scanning into the CI/CD pipeline, generating SBOMs, and more |
|
|
CONNECT WITH TECHREPUBLIC |
|
|
We're on TikTok and Instagram now! |
|
|
Visit the Subscription Center to get other free newsletters, manage your account settings or to be removed from TechRepublic communications. |
|
|
© 2023 TechnologyAdvice, LLC. All rights reserved. All rights reserved. This is a marketing email from TechnologyAdvice, 3343 Perimeter Hill Dr., Suite 100, Nashville, TN 37211, USA. Please do not reply to this message. To contact us, please click here. |
|
|
|