Todd

66%
Flag icon
We do this by generating automated tests to ensure that all appropriate settings have been correctly applied for configuration hardening, database security settings, key lengths, and so forth. Furthermore, we will use tests to scan our environments for known vulnerabilities.¶
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations
Rate this book
Clear rating