DoD CIO Enterprise DevSecOps Reference Design - Summarywaiting to apply each skill set sequentially. Security risks of the underlying infrastructure must be measured and quantified, so that the total risks and impacts to software applications are understood Mesh 3. Program-specific artifact repository 4. Runtime Behavior Analysis Artificial Intelligence (AI) service 5. DCAR for the hardened containers 6. Common Vulnerabilities and Exposures (CVE)Service0 码力 | 8 页 | 3.38 MB | 5 月前3
The DevOps Handbookenvironment. Helps identify compensatory behaviors and workarounds driven by un/usability ii. Same benefits applies with internal customers (infrastructure, operations, etc.) iii. Gene Kim – “One of the requests – sufficient detail on why the change is made, how the change was made, and identified risks and resulting countermeasures j. FEARLESSLY CUT BUREAUCRATIC PROCESSES i. Adrian Cockcroft – “A0 码力 | 8 页 | 24.02 KB | 5 月前3
A Seat at the Table: IT Leadership in the Age of Agility - Part 2process involve project sponsors (1) developing a formal proposal that incorporates estimated benefits, risks, and resource requirements and (2) submitting the proposal to decision makers who select0 码力 | 7 页 | 387.61 KB | 5 月前3
A Seat at the Table - IT Leadership in the Age of Agilitytransformation, when we see them as tightly integrated into an EA, and when we realize that the costs and risks of custom development have been radically reduced, the economics often now favor custom development potential risks, actively working to prevent them, and, if necessary, building slack into the plan to manage the potential impact of the risk on schedule. Such an approach assumes that the risks are bounded bounded and can be itemized, that we can know the risks in advance, and that we have a way to (try to) control them. The relationship between uncertainty, risk, and change is far too complicated for0 码力 | 7 页 | 387.48 KB | 5 月前3
The Phoenix ProjectThird Way is about creating a culture that fosters two things: continual experimentation, taking risks and learning from failure; and understanding that repetition and practice is the prerequisite to allocating time for the improvement of daily work, creating rituals that reward the team for taking risks, and introducing faults into the system to increase resilience. Four Types of Work 1. Business projects0 码力 | 3 页 | 154.45 KB | 5 月前3
A Seat at the Table - IT Leadership in the Age of Agility What are the key risks to delivery? What assumptions are contained in the plans? How will the team move quickly to test those assumptions and gain information to manage the risks? I want to understand0 码力 | 4 页 | 379.23 KB | 5 月前3
The DevOps Handbookquality and safety problems ii. high-trust culture 1. we are all lifelong learners who must take risks in our daily work 2. we learn from our successes and failures, identifying which ideas don’t work0 码力 | 8 页 | 22.57 KB | 5 月前3
The DevOps HandbookAND COMPLIANCE INTO CHANGE APPROVAL PROCESSES i. Effective change management recognized different risks associated with different types of changes, to be handled differently 1. Standard changes: lower-risk0 码力 | 9 页 | 25.13 KB | 5 月前3
The DevOps Handbookiii. DevOps goal – shift reliance from separate groups to other control mechanisms to mitigate risks more effectively using 1. Automated testing 2. Automated deployment 3. Peer reviews iv. 2013 State0 码力 | 8 页 | 23.08 KB | 5 月前3
Government Excerptparts of the government that do everything from issue driver’s licenses, to distribute unemployment benefits, to regulate fish and wildlife. In 2012 they oversaw eighty requests totaling more than $4000 码力 | 3 页 | 414.99 KB | 5 月前3
共 10 条
- 1













