DevSecOps Guides
Subscribe
Sign in
Home
Notes
Guides
Archive
About
Latest
Top
Attacking Nginx
Nginx, a popular web server and reverse proxy, is a critical component in many web infrastructures, making it a prime target for attacks.
Jan 26, 2025
•
Reza
2
DevSecOps Process Management
Covers eight core processes that span the software delivery lifecycle. Each process includes implementation details for different organizational…
Nov 21, 2025
•
Reza
3
1
Building and Breaking Secure Kubernetes Helm Charts
Helm Charts Hardening Guides
Oct 24, 2025
•
Reza
3
1
Continuous Delivery Security Labs
35 security labs covering ArgoCD and GitHub Actions.
Mar 13
•
Reza
2
AWS EC2 Attack and Defend:
The Battle for the Cloud's Beating Heart
Jun 16, 2025
•
Reza
2
Attacking Kubernetes
In the ever-evolving landscape of cybersecurity, Kubernetes has emerged as a dominant force in managing containerized applications.
Jan 26, 2025
•
Reza
3
SBOM and Bill of Materials Security Labs in 2026
We wrote 35 hands-on labs covering every aspect of Software Bill of Materials and its variants. Each lab walks through a real gap in visibility, shows…
Apr 3
•
Reza
2
Container Attack and Defend
Container Security Cheatsheet
Jul 18, 2025
•
Reza
1
1
Attacking Docker
Docker has revolutionized the way software is developed, deployed, and managed by providing a lightweight, portable, and scalable platform for…
Jan 26, 2025
•
Reza
1
HTTP Security Headers
1.
Jan 26, 2025
•
Reza
3
Secure Coding Labs in 2026
53 secure coding labs in various language
Feb 20
•
Reza
2
1
Investigate Incident with Logs like Ninja
dev/sec/ops important services logs
Dec 12, 2025
•
Reza
2
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts