Automated CI/CD is great until…it’s compromised
Great article with ten real world examples. Keeping your build environment secure means reviewing:
- Default configurations
- Over permissive permissions and roles
- Lack of security controls
- Lack of segmentation and segregation
More details here at the InfoSec Institute here
Tags: [continuousintegration] [itsecurityoperations] [cybersecurity]