While CI/CD pipelines play a critical role in accelerating software delivery, automation, and innovation, the fast pace of these environments can introduce security gaps that require a new set of strategies to mitigate threats
 

Subscription Center | Unsubscribe

Developer Insider

Sponsored by: 

Red Hat
Security Best Practices in Your CI/CD Pipelines

While CI/CD pipelines play a critical role in accelerating software delivery, automation, and innovation, the fast pace of these environments can introduce security gaps that require a new set of strategies to mitigate threats.

 

Join this fireside chat on September 20th to discover the best practices for securing your CI/CD pipelines in cloud-native environments. After taking a look at common CI/CD threats and the attack surface, we'll walk through hardening approaches related to:

  • Authentication and access control
  • Dev environment – such as keeping tools, software, and OS up to date
  • Development – including embedding security scanning into the CI/CD pipeline, generating SBOMs, and more
SAVE YOUR SEAT
 

CONNECT WITH TECHREPUBLIC

 

We're on TikTok and Instagram now!

FacebookTwitterInstagramLinkedInTikTokYouTube

Visit the Subscription Center to get other free newsletters, manage your account settings or to be removed from TechRepublic communications.

Unsubscribe | FAQ | Terms of Use | Privacy Policy

© 2023 TechnologyAdvice, LLC. All rights reserved. All rights reserved.

This is a marketing email from TechnologyAdvice, 3343 Perimeter Hill Dr., Suite 100, Nashville, TN 37211, USA. Please do not reply to this message. To contact us, please click here.