From edace113485c1e155dd4e461cd2c3ca7df5b0e83 Mon Sep 17 00:00:00 2001 From: Ed Lan <165309301+Edlan01@users.noreply.github.com> Date: Thu, 15 May 2025 23:28:26 +0200 Subject: [PATCH] chore: update devops content (#8650) --- src/data/question-groups/devops/content/devsecops.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/data/question-groups/devops/content/devsecops.md b/src/data/question-groups/devops/content/devsecops.md index ee9ee7300..d97a025d5 100644 --- a/src/data/question-groups/devops/content/devsecops.md +++ b/src/data/question-groups/devops/content/devsecops.md @@ -3,7 +3,7 @@ To implement security in a DevOps pipeline (DevSecOps), you should integrate sec That includes: 1. **Shift Left Security**: Incorporate security early in the development process by integrating security checks in the CI/CD pipeline. This means performing static code analysis, dependency scanning, and secret detection during the build phase. -2. **Automated Testing**: Implement automated security tests, such as vulnerability scans and dynamic application security testing (DAST), to identify potential security issues before they reach production. +2. **[Automated Testing](https://roadmap.sh/devops/test-automation)**: Implement automated security tests, such as vulnerability scans and dynamic application security testing (DAST), to identify potential security issues before they reach production. 3. **Continuous Monitoring**: Monitor the pipeline and the deployed applications for security incidents using tools like Prometheus, Grafana, and specialized security monitoring tools. 4. **Infrastructure as Code - Security**: Ensure that infrastructure configurations defined in code are secure by scanning IaC templates (like Terraform) for misconfigurations and vulnerabilities (like hardcoded passwords). 5. **Access Control**: Implement strict access controls, using something like role-based access control (RBAC) or ABAC (attribute-based access control) and enforcing the principle of least privilege across the pipeline.