Incorporating chaos engineering practices is a proactive strategy to uncover and address potential system weaknesses. By conducting controlled experiments, you can gauge the resilience of
Category: Binary authorization
Security and testing best practices for modern DevOps pipelines – Securing and Testing Your CI/CD Pipeline
Tooling is not the only thing that will help you in your DevSecOps journey. Here are some helpful tips that can help you address security
Binary authorization – Securing and Testing Your CI/CD Pipeline
Binary authorization is a deploy-time security mechanism that ensures that only trusted binary files are deployed within your environments. In the context of containers and
Testing your application within the CD pipeline– Securing and Testing Your CI/CD Pipeline
Until now, we’ve deployed our application on a Kubernetes cluster and manually verified that it is running. We have two options moving forward: either proceed
Installing external secrets with Terraform – Securing and Testing Your CI/CD Pipeline
Let’s configure our local repository to install the external secrets manifest. To do so, copy the application manifest and app.tf file using the following commands:$
Creating a Secret in Google Cloud Secret Manager – Securing and Testing Your CI/CD Pipeline
Let’s create a secret called external-secrets, where we will pass the MongoDB credentials in JSON format. To do so, run the following command: $ echo
Installing Anchore Grype – Securing and Testing Your CI/CD Pipeline
As we want to implement vulnerability scanning within our CI pipelines, let’s modify the mdo-posts repository we created in Chapter 11. Let’s clone the repository
Revisiting the Blog Application – Securing and Testing Your CI/CD Pipeline
As we already discussed the Blog App in the last chapter, let’s look at the services and their interactions again in the following diagram: Figure
Securing and testing CI/CD pipelines – Securing and Testing Your CI/CD Pipeline-1
With continuous cyber threats and the ongoing war between cybersecurity experts and cybercriminals, security has always been the top priority for most organizations, and it
Installing the Sealed Secrets operator – Continuous Deployment/ Delivery with Argo CD
To install the Sealed Secrets operator, all you need to do is download the controller manifest from the latest release at https://github.com/bitnami-labs/sealed-secrets/releases. At the time