Skip to content

Latest commit

 

History

History
39 lines (29 loc) · 1.86 KB

File metadata and controls

39 lines (29 loc) · 1.86 KB
layout title tags level type pitch
col-sidebar
OWASP DevSecOps Guideline
DevSecOps
2
documentation
The OWASP DevSecOps Guideline can help us to embeding security as a part of pipeline.

The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use in this matter. Also, the project is trying to help us promote the shift-left security culture in our development process. This project helps any companies of each size that have a development pipeline or, in other words, have a DevOps pipeline. We try to draw a perspective of a secure DevOps pipeline during this project and then improve it based on our customized requirements.

The Ideal goal is "detect security issues (by design or application vulnerability) as fast as possible."

DevSecOps pipeline

Initial steps:

At first, we consider to implement the following steps in a basic pipeline:

  • Scan git repositories for finding potential credentials leakage.
  • SAST (Static Application Security Test)
  • SCA (Software Composition Analysis)
  • IAST (Interactive Application Security Testing)
  • DAST (Dynamic Application Security Test)
  • IaC Scanning (Scanning Terraform, HelmChart code to find misconfiguration)
  • Infrastructure scanning
  • Compliance check

Latest

You can read the latest development documents in our official GitHub repository or view the latest content at latest.

Contributions

Feel free to contribute to this project; any contributors are welcome to make a pull request on the project repo.

Related Project[s]: