8 articles tagged #security.
AWS identity and access management service controlling who can do what in your account, with granular policies based on the principle of least privilege.
Practices and tools for securing containers throughout their lifecycle: image building, runtime, orchestration, and compliance.
Integration of security practices throughout the software development lifecycle, automating security controls in the CI/CD pipeline.
Practices and tools for securely storing, distributing, and rotating credentials, API keys, and other sensitive data in applications and pipelines.
Development practices preventing security vulnerabilities from design, including input validation, error handling, and defense-in-depth principles.
Practices for ensuring the integrity and security of all dependencies, tools, and processes comprising the software development pipeline.
Automated process of identifying known vulnerabilities in code, dependencies, containers, and infrastructure before they reach production.
Security model that doesn't implicitly trust any user or system, verifying every request regardless of its origin inside or outside the network.