The DevOps Handbook
expected iv. Great Amazon Reboot of 2014 – 10% of Amazon EC2 servers had to reboot for Xen emergency security patch. At Netflix, zero downtime, no one actively working incidents. They were at a Hollywood party infrastructure, and environments 2. Deployment tools 3. Testing standards and tools, including security 4. Deployment pipeline tools 5. Monitoring and analysis tools 6. Tutorials and standards ii Technical Practices of Integrating Information Security, Change Management, and Compliance 1. Introduction a. Goal to simultaneously achieve Information Security goals and create high degree of assurance0 码力 | 9 页 | 25.13 KB | 5 月前3DoD CIO Enterprise DevSecOps Reference Design - Summary
aims at unifying software development (Dev), security (Sec) and operations (Ops). The main characteristic of DevSecOps is to automate, monitor, and apply security at all phases of the software lifecycle: DevSecOps, testing and security are shifted to the left through automated unit, functional, integration, and security testing - this is a key DevSecOps differentiator since security and functional capabilities continuous monitoring approach in parallel instead of waiting to apply each skill set sequentially. Security risks of the underlying infrastructure must be measured and quantified, so that the total risks0 码力 | 8 页 | 3.38 MB | 5 月前3The DevOps Handbook
Agile c. Myth—DevOps is incompatible with ITIL d. Myth—DevOps is Incompatible with Information Security and Compliance: e. Myth—DevOps Means Eliminating IT Operations, or “NoOps” f. Myth—DevOps is Just designed. b. automate as much of the quality checking typically performed by a QA or Information Security department as possible c. Gary Gruver observes, “It’s impossible for a developer to learn anything structures, but in developing capability and habits in its people.” f. TESTING, OPERATIONS, AND SECURITY AS EVERYONE’S JOB, EVERY DAY i. In high-performing organizations – shared common goal that is0 码力 | 8 页 | 22.57 KB | 5 月前3DevOps Meetup
Installations Route Adds – requires heightened security access Database Data Script Execution Load Balancer Node Disablement OS and Security Patching Requesting access to technology specific0 码力 | 2 页 | 246.04 KB | 5 月前3The DevOps Handbook
automate tests to validate the “-ilities” that are important (availability, capacity, security, etc.) ii. Incorporate security hardening testing and evaluation m. PULL OUR ANDON CORD WHEN THE DEPLOYMENT PIPELINE0 码力 | 8 页 | 23.08 KB | 5 月前3A Seat at the Table - IT Leadership in the Age of Agility
AWS he was the CIO of US Citizenship and Immigration Service (part of the Department of Homeland Security), CIO of Intrax, and CEO of Auctiva. He has an MBA from Wharton, a BS in Computer Science from0 码力 | 4 页 | 379.23 KB | 5 月前3The DevOps Handbook
5. Fatal – forces a termination iv. Examples of potentially significant events (Gartner’s GTP Security & Risk Management group) 1. Authentication/authorization decisions 2. System and data access0 码力 | 8 页 | 24.02 KB | 5 月前3A Seat at the Table: IT Leadership in the Age of Agility - Part 2
AWS he was the CIO of US Citizenship and Immigration Service (part of the Department of Homeland Security), CIO of Intrax, and CEO of Auctiva. He has an MBA from Wharton, a BS in Computer Science from0 码力 | 7 页 | 387.61 KB | 5 月前3A Seat at the Table - IT Leadership in the Age of Agility
AWS he was the CIO of US Citizenship and Immigration Service (part of the Department of Homeland Security), CIO of Intrax, and CEO of Auctiva. He has an MBA from Wharton, a BS in Computer Science from0 码力 | 7 页 | 387.48 KB | 5 月前3k8s操作手册 2.3
/etc/selinux/config # setenforce 0 #关闭selinux ④ulimit设置 # cat >> vi /etc/security/limits.conf <0 码力 | 126 页 | 4.33 MB | 1 年前3
共 10 条
- 1