Artwork

Content provided by Opsglue. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Opsglue or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Building a Secure CI/CD Pipeline: A Guide to Safer Software Delivery

7:52
 
Share
 

Manage episode 404706963 series 3553148
Content provided by Opsglue. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Opsglue or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In today's fast-paced software development landscape, Continuous Integration and Continuous Delivery (CI/CD) pipelines are the backbone of efficient delivery. However, security must be a top priority, as a compromised pipeline can expose your code, customers, and reputation to significant risk.
You can find links to the studies and products we mention in the blog post.
Read the Blog Here
0:00 Intro
1:04 Securing Your Pipeline Configuration
3:00 Implement Security Testing
5:23 Enforce Least Privilege and Access Control
6:19 Code and Commit Signing
6:44 Conclusion

Follow us:
LinkedIn | Facebook | Twitter | The Ops Review Newsletter

  continue reading

3 episodes

Artwork
iconShare
 
Manage episode 404706963 series 3553148
Content provided by Opsglue. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Opsglue or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In today's fast-paced software development landscape, Continuous Integration and Continuous Delivery (CI/CD) pipelines are the backbone of efficient delivery. However, security must be a top priority, as a compromised pipeline can expose your code, customers, and reputation to significant risk.
You can find links to the studies and products we mention in the blog post.
Read the Blog Here
0:00 Intro
1:04 Securing Your Pipeline Configuration
3:00 Implement Security Testing
5:23 Enforce Least Privilege and Access Control
6:19 Code and Commit Signing
6:44 Conclusion

Follow us:
LinkedIn | Facebook | Twitter | The Ops Review Newsletter

  continue reading

3 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide