Build, Deploy & Operations
Pipeline security, SBOM, supply chain management, secrets, container security, and environments.
Modules
Pipeline Security
CI/CD pipeline security covering hardening, scanning stages, secrets management, and protecting the build system as an attack surface.
Artifact Integrity & SBOM
Artifact integrity verification, SBOM generation, and software supply chain transparency using SLSA and in-toto frameworks.
Dependency & Supply Chain Management
Dependency and supply chain management including SCA, license compliance, vulnerability monitoring, and mitigating dependency confusion attacks.
Secrets Management
Secrets management best practices covering vaults, rotation, detection, and preventing secret exposure in code and CI/CD pipelines.
Infrastructure Hardening & Container Security
Infrastructure hardening and container security covering IaC security, CIS Benchmarks, image scanning, and runtime protection.
Environment Separation & Deployment
Environment separation and deployment strategies ensuring security isolation between development, staging, and production environments.
Secure Development Environment
Secure development environment configuration covering endpoint security, IDE hardening, and developer workstation standards.