DevSecOps Guides
Subscribe
Sign in
Home
Notes
Guides
Archive
About
Investigate Incident with Logs like Ninja
dev/sec/ops important services logs
READ THE LATEST
Most Popular
View all
Attacking Nginx
Jan 26
•
Reza
2
DevSecOps Process Management
Nov 21
•
Reza
2
AWS EC2 Attack and Defend:
Jun 16
•
Reza
2
Building and Breaking Secure Kubernetes Helm Charts
Oct 24
•
Reza
2
1
Latest
Top
Secret Alternatives for DevSecOps Engineers
some techniques to reduce use secret for devops environments and cloud native apps
Dec 5
•
Reza
Feature Flagging for DevSecOps Engineer
enable or disable feature specifically security feature
Nov 28
•
Reza
DevSecOps Process Management
Covers eight core processes that span the software delivery lifecycle. Each process includes implementation details for different organizational…
Nov 21
•
Reza
2
Secret Management Like a Ninja: A Tale of Compromise, Recovery, and Mastery
This article tells the story of how secrets fail, how attackers exploit them, and how defenders can build impenetrable secret management practices; all…
Nov 14
•
Reza
Keycloak Tenants vs Realms: For Fun and Profit
Keycloak is an open-source Identity and Access Management (IAM) solution security best practices with attack scenario
Nov 7
•
Reza
Building and Breaking Secure Kubernetes Helm Charts
Helm Charts Hardening Guides
Oct 24
•
Reza
2
1
Secure by Design - The Reverse Proxy Security Paradox
Your reverse proxy sits at the edge of your infrastructure the gatekeeper that becomes the breach point. It’s the component trusted to route traffic…
Oct 17
•
Reza
See all
DevSecOps Guides
Comprehensive resource for integrating security into the software development lifecycle.
Subscribe
DevSecOps Guides
Subscribe
About
Archive
Sitemap
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts