DoD CIO Enterprise DevSecOps Reference Design - Summary
whitelist, Role-Based Access Control (RBAC), continuous monitoring, signature-based continuous scanning using Common Vulnerabilities and Exposures (CVEs), runtime behavior analysis, and container policy detection. This can also be used to send notifications when there is anomalous behavior. 4. Vulnerability Management 5. A service mesh proxy to connect to the service mesh 6. Zero Trust down to0 码力 | 8 页 | 3.38 MB | 5 月前3The DevOps Handbook
as memory, functional behavior, and other elements. Testing from the outside-in 3. Dependency Scanning – inventory the dependencies for vulnerabilities or malicious binaries 4. Source code integrity0 码力 | 9 页 | 25.13 KB | 5 月前3
共 2 条
- 1