Great article with ten real world examples. Keeping your build environment secure means reviewing:

  • Default configurations
  • Over permissive permissions and roles
  • Lack of security controls
  • Lack of segmentation and segregation

More details here at the InfoSec Institute here

Tags: [continuousintegration] [itsecurityoperations] [cybersecurity]