Tooling is not the only thing that will help you in your DevSecOps journey. Here are some helpful tips that can help you address security
Category: Exams of Cloud
Merging code and deploying to prod – Securing and Testing Your CI/CD Pipeline
As demonstrated in the previous section, the Dev CD workflow created our environment, deployed the application, tested it, and attested application images. It then automatically
Release gating with pull requests and deployment to production – Securing and Testing Your CI/CD Pipeline
The process of pull request gating is straightforward. At the end of the Dev CD workflow, we’ll introduce a step to initiate a pull request
Setting up binary authorization – Securing and Testing Your CI/CD Pipeline-2
The YAML file performs several tasks, including the installation of gcloud and authentication with GCP. It also installs the gcloud beta CLI and, importantly, attests
Generating the MongoDB Kubernetes Secret using External Secrets Operator – Securing and Testing Your CI/CD Pipeline
To generate the mongodb-creds secret, we would need to create the following resources:• A Secret resource – This is a standard Kubernetes Secret resource containing
Creating a Secret in Google Cloud Secret Manager – Securing and Testing Your CI/CD Pipeline
Let’s create a secret called external-secrets, where we will pass the MongoDB credentials in JSON format. To do so, run the following command: $ echo
Managing secrets – Securing and Testing Your CI/CD Pipeline
Software always requires access to sensitive information such as user data, credentials, Open Authorization (OAuth) tokens, passwords, and other information known as secrets. Developingand managing
Securing and testing CI/CD pipelines – Securing and Testing Your CI/CD Pipeline-2
CI/CD pipelines are one of the essential features of modern DevOps, and they orchestrate all processes and combine all tools to deliver better software faster,
Securing and testing CI/CD pipelines – Securing and Testing Your CI/CD Pipeline-1
With continuous cyber threats and the ongoing war between cybersecurity experts and cybercriminals, security has always been the top priority for most organizations, and it
Deploying the sample Blog App – Continuous Deployment/ Delivery with Argo CD
To deploy the sample Blog App, we need to define application resources. We’ve already discussed what our app is composed of. We have defined the