Todd

64%
Flag icon
When engineers use one of these predefined libraries or services, they won’t need to schedule a separate security design review for that module; they’ll be using the guidance we’ve created concerning configuration hardening, database security settings, key lengths, and so forth.
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations
Rate this book
Clear rating