Category: Dev, Test, Optimisation
Cloud Vulnerability Scanning can be defined as a process of identifying security risks in Cloud-based applications and infrastructure. Cloud Vulnerability Scanning is usually performed by specialized security tools that are designed to automatically identify common
Automating the provisioning of Virtual Machines includes using a SaaS or platform such as ServiceNow (ITSM), a CMDB (configuration management database), APIs, Request approval, Pricing against a catalogue per environment, usage, tracking and de-commissioning.
Here are five areas where teams can add automated security checks into development pipelines. 1. Code quality (SAST) Perhaps the control that springs to mind first when people think about software security is code quality
(Steps to deploy a Jenkins build server in AWS https://d1.awsstatic.com/Projects/P5505030/aws-project_Jenkins-build-server.pdf) Continuous integration takes code from source control to deployment readiness in a centralized repository. DevOps teams can also turn code into an artifact for
Amazon Elastic Container Service (Amazon ECS) is a fully managed container orchestration service that makes it easy to operate containerized workloads at scale. It also integrates with other core AWS services, such as Amazon Route
Infrastructure as code (IaC), attempts to codify the underlying deployment infrastructure. There are 2 broad categories: continuous deployment, or continuous delivery. They are slightly different concepts with continuous deployment seamlessly integrating with the usual ‘infinity