DevOps Conference
The Conference for Continuous Delivery, Microservices,
Containers, Clouds and Lean Business

Best Practices for securing CI/CD Pipelines or how to get Security right

Session
Until Conference Starts:
✓ Group Discount
✓ Individual offers for
Freelancers and employees of scientific institutions

Register now
Bis Konferenzbeginn
✓ Kollegenrabatt

✓ Sonderkonditionen für Freelancer und
Mitarbeiter von wissenschaftlichen Einrichtungen

✓ Bis zu 375 € sparen
Jetzt anmelden
Until December 12:
✓ Workshop Day for free
✓ Raspberry Pi or C64 Mini for free
✓ Save up to $690
Register now
Until December 12:
✓ Workshop Day for free
✓ Raspberry Pi or C64 Mini for free
✓ Save up to $690
Register now
Until November 28:
✓ Transformation Day for free
✓ Raspberry Pi or C64 Mini for free
✓ Save over £689
Register Now

Until November 28:
✓ Transformation Day for free
✓ Raspberry Pi or C64 Mini for free
✓ Save over £689
Register Now

Until March 5:
✓ Transformation Day for free
✓ Raspberry Pi or C64 Mini for free
✓ Save over 850 €
Register now
Bis 5. März:
✓ Transformation Day for free
✓ Raspberry Pi oder C64 Mini for free
✓ Über 850 € sparen
Jetzt anmelden
Until June 18:
✓ Workshop Day for free
✓ Raspberry Pi or C64 Mini for free
✓ Save over $840
Register now
Until June 18:
✓ Workshop Day for free
✓ Raspberry Pi or C64 Mini for free
✓ Save over $840
Register now
Infos
Wednesday, June 12 2019
11:45 - 12:45
Room:
MOA 9+10

DevOps practices are in a place, containers are everywhere, pipelines are flying. We do Agile. We do DevOps. Now we should focus on following security practices for protecting the deployed resources, too. This is a reason why DevSecOps is not a hype anymore and is gaining more prominence. There is a lot of information about DevSecOps, but how to do it properly? Where to start? What are the best practices?

In this session, we will walk through an end-to-end scenario where we will deploy infrastructure components and solutions securely to the cloud. We will build a pipeline with security in mind to protect and detect potential security flaws during the build. We will focus on main the principles that you can apply to the most popular and used solutions and tools.

You will learn essential concepts:

 

  • how to build an end-to-end CI/CD pipeline that builds the application and deploys infrastructure with security checks for the application, containers, and infrastructure;
  • what security tools are available for CI/CD pipelines and the best way to implement them into different Git workflows;
  • best practices and patterns of building security pipelines.

Stay tuned:

Behind the Tracks

 

Kubernetes Ecosystem

Docker, Kubernetes & Co

Microservices & Software Architecture

Maximize development productivity

Continuous Delivery & Automation

Build, test and deploy agile

Cloud Platforms & Serverless

Cloud-based & native apps

Monitoring, Traceability & Diagnostics

Handle the complexity of microservices applications

Security

DevSecOps for safer applications

Business & Company Culture

Radically optimize IT

Organizational Change

Overcome obstacles on the way towards DevOps

Live Demo #slideless

Showing how technology really works