Dev Sec Ops
Dev Sec Ops
Secure Coding
• Sign
o Verifies both the signature of the code and that the code has not
been tampered with. This can be done for local and/or remote
signatures and uses a cryptographic hash.
o An artifact scan scans all the artifacts that were created during
development for vulnerabilities, and an image repository scan
scans images when they are pushed to a repository. Any images
that fail the scan are not uploaded.
• Penetration Testing
Disclaimer: (This post has been shared only for technology education & knowledge sharing
purpose and for understanding views and comments of people on this specific technology. there
is no endorsement of any products or services)