DevSecOps: Implement security on CICD Pipeline
CICD 파이프라인에서 보안 구성하기. 각 단계별 사용하는 프로그램 정리가 되어 있음.
DevSecOps: Implement security on CICD Pipeline
Design
Develop
Build
Test
Deploy
Monitor
OSS tools mentioned:
Kube-bench — Kubernetes Hardening
ansible-collection-hardening — Linux Hardening
Linkerd or Istio — Service Mesh
OPA(gatekeeper) and Kyverno — Policy
Gitleaks and Trufflehog — Sensitive Information
pyraider — Source Composition Analysis
bandit — SAST
SonarLint and SonarQube — Static Code Analysis
Cyclonedx — SBOM
ZAP — DAST
Jmeter — Performance Test
Arachni — Pentration Test
Terrascan, Tfsec, KubeLinter, and Checkov — IaC, and k8S
Trivia and Twistlock- Image Scanning
Prometheus, Grafana and Loki — Monitoring
Elasticsearch, Fluentd, and Kibana — Monitoring
Paid Tools that need to consider if you and your manager are more concerned about security:
Snyk — OpenSource, Code, Container, and IaC Scan
Fortify — Static Code Analyzer
Codacy — Measure code quality
New Relic
Dynatrace
Sysdig
Datadoghq