|
|
|||
|
||||
OverviewStop Choosing Between Speed and Security. Build the Ironclad Pipeline. In the high-velocity world of modern software development, the traditional security model is broken. For years, engineering teams have been forced to accept a dangerous trade-off: move fast and break things, or move slow and stay secure. The ""Department of No"" sets up gates that kill innovation, while developers bypass controls to meet deadlines, leaving production environments exposed to catastrophic risk. It does not have to be this way. DevSecOps Pipelines: A Practical Guide to Integrating SAST, DAST, and Vulnerability Management into Modern CI/CD Workflows is the definitive field manual for the engineer who refuses to compromise. This book moves beyond high-level theory to provide a hands-on, code-first blueprint for automating security at the speed of DevOps. Written for DevOps engineers, security practitioners, and software architects, this guide deconstructs the ""Ironclad Pipeline"" a system where security is not a hurdle, but a seamless, invisible quality attribute baked into every commit. Inside, you will discover how to: Operationalize the ""Shift Left"" Move security analysis from the weeks-long pre-production audit directly into the developer's IDE and Pull Request workflow, reducing the cost of remediation by orders of magnitude. Master the Triad of Scanning: Deep dive into the technical implementation of Static Analysis (SAST) to catch bad code, Dynamic Analysis (DAST) to simulate attacker behavior, and Software Composition Analysis (SCA) to hunt down the hidden risks in your third-party dependency chain. Secure the Supply Chain: Learn to generate and manage Software Bills of Materials (SBOMs), sign container images for provenance, and automate the patching of vulnerabilities using intelligent bots. Codify Governance: Replace dusty PDF policy documents with executable Policy-as-Code (PaC) using Open Policy Agent (OPA), ensuring that no insecure infrastructure ever reaches your Kubernetes cluster. Eliminate Alert Fatigue: Implement advanced strategies for vulnerability aggregation, deduplication, and baseline management using tools like DefectDojo to turn a flood of noise into actionable signal. Orchestrate the Gate: Design sophisticated Quality Gates that can distinguish between a ""blocking"" critical risk and a ""non-blocking"" technical debt, utilizing waivers and SLAs to keep the business moving. From hardening Dockerfiles and terraforming secure cloud infrastructure to translating technical metrics into executive-level risk narratives, this book covers the full spectrum of the DevSecOps lifecycle. Whether you are building your first pipeline in GitHub Actions or managing a complex enterprise fleet in Jenkins, this book provides the scripts, strategies, and architectural patterns you need to transform your organization. Don't just find bugs. Eliminate the possibility of them ever reaching production. Full Product DetailsAuthor: Brian C WillardPublisher: Independently Published Imprint: Independently Published Dimensions: Width: 17.00cm , Height: 1.10cm , Length: 24.40cm Weight: 0.349kg ISBN: 9798277010181Pages: 214 Publication Date: 02 December 2025 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Available To Order We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||