Category: Software, Business, Security, Infrastructure

JFrog sponsored The New Stack’s coverage of SwampUP 2021. The question of who owns security in the DevOps process goes back at least until 2012, when DevOps pioneers Gene Kim and Josh Corman suggested the term at the RSA security conference.

Traditionally, the approach security teams have taken is to set up gates between each of the steps in a continuous integration and deployment (CI/CD) pipeline, she said.

This is what breaks the CI/CD,” Miller warned of this approach.

Identify the crucial assets that are critical to that particular user story and then identify the threats.”

Related Articles