You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Books focussed around DevSecOps, bringing the security focus up front.
153
152
@@ -248,12 +247,14 @@ DevSecOps requires a common attack modeling capability that can be done at speed
248
247
To support security as code, sensitive credentials and secrets need to be managed, security, maintained and rotated using automation. The projects below provide DevOps teams with some good options for securing sensitive details used in building and deploying full stack software deployments.
These are tools that we find helpful during Red Team and War Game exercises. The projects in this section help with reconnaissance, exploit development, and other activities common within the Kill Chain.
259
260
@@ -266,6 +267,7 @@ Making DevSecOps discoveries is already hard enough with all the APIs and Comman
A collection of tools to help with sharing knowledge and telling the story.
@@ -275,11 +277,10 @@ A collection of tools to help with sharing knowledge and telling the story.
275
277
276
278
277
279
## ChatOps
278
-
One of the greatest changes you can make in your organization is boundaryless communications. Setting up ChatOps can enable everyone to come together and solve problems.
280
+
One of the greatest changes you can make in your organization is boundaryless communications. Setting up ChatOps can enable everyone to come together and solve problems.
0 commit comments