What methods evaluate risks in continuous integration/continuous deployment (CI/CD) artifacts to secure code deployments?
What methods evaluate risks in continuous integration/continuous deployment (CI/CD) artifacts?
Share
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Static application security testing (SAST), Dynamic application security testing (DAST), Software Composition Analysis (SCA), Container security scanning, Infrastructure as Code (IaC) scanning, and manual code review are some methods used to evaluate risks in Continuous Integration/Continuous Deployment (CI/CD) artifacts for securing code deployments.