1NICOLAS BYLDEVSECOPSVOM UNIKUM ZUR GUT GEÖLTENMASCHINE
View Slide
2INTRODUCTION
3THE DEVSECOPS CYCLE
4THE CASTLE ILLUSION
5THE DEVSECOPS CYCLE
6THE DEVSECOPS CYCLE
7SECURE ARCHITECTURE
8THREAT MODELLING
9COMPLIANCE
10PENTESTS
11THE DEVSECOPS CYCLE
12DESIGN PATTERNS
13PRE-COMMIT HOOKS
14CODE REVIEWS
15COMMIT SIGNING
16THE DEVSECOPS CYCLE
17THE DEPENDENCY ICEBERG
18AUTOMATION IS KINGSOURCE CODE ANALYSIS• FindBugs• SonarQube• SAST• DASTSOURCE CODE ANALYSISDEPENDENCY ANALYSIS• Maven, npm, ...• Container Images• Operating SystemPackagesUPDATE AUTOMATION• npm audit• Dependabot• Renovate
19THE DEVSECOPS CYCLE
20POLICY OVER CHECKLISTS
21THE KEY TO THE KINGDOM
22ZERO-TRUST DEPLOYMENT
23ROLLER COASTERPASSWORDS
24INVENTORY SCANS
25FIRE DRILLS & CHAOSENGINEERING
26HOW TO GET IN TOUCH[email protected]@ClusterBauerhttps://www.nexineer.io/career/WE ARE ALWAYS LOOKING FOR GREAT COLLEAGUES…
27PATCHINGSicheres ArtefaktArtefaktmit bekannterSchwachstelleScanningPatching