(?)
Quotes are added by the Goodreads community and are not verified by Goodreads. (Learn more)
Gene Kim

“The infrastructure that supports our continuous integration and continuous deployment processes also presents a new surface area vulnerable to attack. For instance, if someone compromises the servers running the deployment pipeline that has the credentials for our version control system, it could enable someone to steal source code. Worse, if the deployment pipeline has write access, an attacker could also inject malicious changes into our version control repository and, therefore, inject malicious changes into our application and services.”

Gene Kim, The DevOps Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations
Read more quotes from Gene Kim


Share this quote:
Share on Twitter

Friends Who Liked This Quote

To see what your friends thought of this quote, please sign up!

0 likes
All Members Who Liked This Quote

None yet!


This Quote Is From

The DevOps Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations The DevOps Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations by Gene Kim
5,794 ratings, average rating, 407 reviews
Open Preview

Browse By Tag