DoD CIO Enterprise DevSecOps Reference Design - Summary
security stack in the security sidecar container will include: 1. A logging agent to push logs to a platform centralized logging service. 2. Container policy enforcement. This includes ensuring container0 码力 | 8 页 | 3.38 MB | 5 月前3The DevOps Handbook
need to be more available and scalable than the systems being monitored.” c. CREATE APPLICATION LOGGING TELEMETRY THAT HELPS PRODUCTION i. Dev & Ops create production telemetry as part of their daily so that we can confirm that is it operating as designed and outcomes are being achieved. iii. Logging Levels 1. Debug – anything that happens in the program 2. Info – user driven actions or system0 码力 | 8 页 | 24.02 KB | 5 月前3The DevOps Handbook
Collaborate with any shared services to provide prebuilt, secured platforms for OS, VMs, authorization, logging and other security/auditing relevant requirements iv. Reduce the friction by providing application/infrastructure0 码力 | 9 页 | 25.13 KB | 5 月前3The DevOps Handbook
intervals iii. Demonstrated in a production-like environment iv. Ideally, use the same monitoring, logging, and other tools in pre-production environments as in production v. Dev & Ops gain shared mastery0 码力 | 8 页 | 23.08 KB | 5 月前3
共 4 条
- 1