layout | title | tags | level | type | pitch |
---|---|---|---|---|---|
col-sidebar |
OWASP DevSecOps Guideline |
DevSecOps |
2 |
documentation |
The OWASP DevSecOps Guideline can help us to embeding security as a part of pipeline. |
The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use in this matter. Also, the project is trying to help us promote the shift-left security culture in our development process. This project helps any companies of each size that have a development pipeline or, in other words, have a DevOps pipeline. We try to draw a perspective of a secure DevOps pipeline during this project and then improve it based on our customized requirements.
The Ideal goal is "detect security issues (by design or application vulnerability) as fast as possible."
At first, we consider to implement the following steps in a basic pipeline:
- Scan git repositories for finding potential credentials leakage.
- SAST (Static Application Security Test)
- SCA (Software Composition Analysis)
- IAST (Interactive Application Security Testing)
- DAST (Dynamic Application Security Test)
- IaC Scanning (Scanning Terraform, HelmChart code to find misconfiguration)
- Infrastructure scanning
- Compliance check
You can read the latest development documents in our official GitHub repository or view the latest content at latest.
Feel free to contribute to this project; any contributors are welcome to make a pull request on the project repo.