REPOSITORY_HEADER // ID: 437
ACCESS_LEVEL: EXPLORER

DevSecOps

CURATED_BY: littlehelperINITIALIZED: ABOUT 2 HOURS_AGOLAST_UPDATE: ABOUT 1 HOUR_AGO
awesome security
0
0
This is a mirrored zone from the [TaptuIT/awesome-devsecops](https://github.com/TaptuIT/awesome-devsecops) repository. Part of the Awesome list collection.

Articles

2_ENTRIES

Books

1_ENTRIES

Communities

2_ENTRIES

Conferences

2_ENTRIES

Newsletters

1_ENTRIES

Podcasts

5_ENTRIES

Secure Development Guidelines

6_ENTRIES

Secure Development Lifecycle Framework

4_ENTRIES

Toolchains

2_ENTRIES

Training

12_ENTRIES

Wikis

2_ENTRIES

Dependency Management

9_ENTRIES

Open source software packages can speed up the development process by allowing developers to implement functionality without having to write all of the code. However, with the open source code comes open source vulnerabilities. Dependency management tools help manage vulnerabilities in open source packages by identifying and updating packages with known vulnerabilities.

Dynamic Analysis

7_ENTRIES

Dynamic Analysis Security Testing (DAST) is a form of black-box security testing where a security scanner interacts with a running instance of an application, emulating malicious activity to find common vulnerabilities. DAST tools are commonly used in the initial phases of a penetration test, and can find vulnerabilities such as cross-site scripting, SQL injection, cross-site request forgery and information disclosure.

Multi-Platform

4_ENTRIES

Cloud Formation

1_ENTRIES

Containers

7_ENTRIES

Terraform

3_ENTRIES

Kubernetes

3_ENTRIES

Ansible

1_ENTRIES

Intentionally Vulnerable Applications

11_ENTRIES

Intentionally vulnerable applications are often useful when developing security tests and tooling to provide a place you can run tests and make sure they fail correctly. These applications can also be useful for understanding how common vulnerabilities are introduced into applications and let you practice your skills at exploiting them.

Monitoring

2_ENTRIES

It's not enough to test and harden our software in the lead up to a release. We must also monitor our production software for usage, performance and errors to capture malicious behavior and potential security flaws that we may need to respond to or address. A wide variety of tools are available to monitor different aspects of production software and infrastructure.

Secrets Management

17_ENTRIES

The software we write needs to use secrets (passwords, API keys, certificates, database connection strings) to access resources, yet we cannot store secrets within the codebase as this leaves them vulnerable to compromise. Secret management tools provide a means to securely store, access and manage secrets.

Secrets Scanning

9_ENTRIES

Source control is not a secure place to store secrets such as credentials, API keys or tokens, even if the repo is private. Secrets scanning tools can scan and monitor git repositories and pull-requests for secrets, and can be used to prevent secrets from being committed, or to find and remove secrets that have already been committed to source control.

Multi-Language Support

8_ENTRIES

C / C++

1_ENTRIES

C#

1_ENTRIES

Configuration Files

2_ENTRIES

Java

3_ENTRIES

JavaScript

1_ENTRIES

Go

1_ENTRIES

.NET

1_ENTRIES

PHP

3_ENTRIES

Python

1_ENTRIES

Ruby

2_ENTRIES

Supply Chain Security

5_ENTRIES

Supply chain attacks come in different forms, targeting parts of the SDLC that are inherently 3rd party: tools in CI, external code that's been executed, and more. Supply chain security tooling can defend against these kinds of attacks.

Threat Modelling

8_ENTRIES

Threat modelling is an engineering exercise that aims to identify threats, vulnerabilities and attack vectors that represent a risk to something of value. Based on this understanding of threats, we can design, implement and validate security controls to mitigate threats. The following list of tools assist the threat modelling process.

Exploration_Discussion

0 / 3000