Creating custom insights – Security Compliance with AWS Config, AWS Security Hub, and Automated Remediation
Creating custom insights Creating custom insights in Security Hub is a strategic approach to enhance your organization’s monitoring and compliance. By tailoring […]
Creating custom insights – Security Compliance with AWS Config, AWS Security Hub, and Automated Remediation
DevSecOps in the modern software supply chain In the rapidly evolving world of the Software Development Life Cycle (SDLC), the integration of […]
Evolution from traditional to agile methods – Security Compliance with AWS Config, AWS Security Hub, and Automated Remediation
Evolution from traditional to agile methods Let’s take a brief journey through the evolution of methodologies, from traditional SDLC to agile methods. […]
Embedding security – Security Compliance with AWS Config, AWS Security Hub, and Automated Remediation
Embedding security While security needs to be embedded within the different SDLC stages, it also needs to evolve as software development practices […]
Integrating security into CI/CD pipelines – Security Compliance with AWS Config, AWS Security Hub, and Automated Remediation
Integrating security into CI/CD pipelines A fundamental aspect of this automation is its role in the shift-left approach to security—it is not […]
Building secure CI/CD pipelines with AWS services – Security Compliance with AWS Config, AWS Security Hub, and Automated Remediation
Building secure CI/CD pipelines with AWS services AWS services provide a comprehensive toolkit for building CI/CD pipelines that prioritize security at each […]
Least privilege in automated processes – Security Compliance with AWS Config, AWS Security Hub, and Automated Remediation
Least privilege in automated processes Often underestimated for automated processes, applying PoLP is just as crucial as it is for human users. […]
Ensuring compliance – Security Compliance with AWS Config, AWS Security Hub, and Automated Remediation
Ensuring compliance Adhering to compliance standards and security best practices is a critical aspect of building CI/CD pipelines. As discussed in Chapter […]