DoD CIO Enterprise DevSecOps Reference Design - Summarywhen there is anomalous behavior. 4. Vulnerability Management 5. A service mesh proxy to connect to the service mesh 6. Zero Trust down to the container level. Zero trust requires strict controls the security sidecar include: 1. Program-specific Log Storage and Retrieval Service 2. Service Mesh 3. Program-specific artifact repository 4. Runtime Behavior Analysis Artificial Intelligence (AI)0 码力 | 8 页 | 3.38 MB | 6 月前3
No Silver Bullet – Essence and Accident in Software Engineeringbut to run that I need… • a Container Management Platform, but to network it I need… • a Service Mesh, but to secure it I need… • an automated Certificate Authority, and for more security I need… • a0 码力 | 35 页 | 1.43 MB | 6 月前3
MITRE Defense Agile Acquisition Guide - Mar 2014manages the sprint backlog. Developers Develops the software, to include software developers, database administrators and architects, testers, and other technical experts. End Users Conveys operational government can acquire the time and expertise of a contractor team of developers, testers, integrators, database specialists, etc. If using an existing contract vehicle (preferably a portfolio-level contract)0 码力 | 74 页 | 3.57 MB | 6 月前3
DevOps MeetupDEG and 3rd Party Application Installations Route Adds – requires heightened security access Database Data Script Execution Load Balancer Node Disablement OS and Security Patching Requesting0 码力 | 2 页 | 246.04 KB | 6 月前3
The DevOps Handbookenvironment, test, c. Swing traffic to new environment, Rollback by swinging traffic back 2. Database changes a. Create two DB – put one in read only mode, backup & restore to new environment, swing0 码力 | 8 页 | 23.08 KB | 6 月前3
共 5 条
- 1













