DevOps Security Considerations: Securing DevOps Pipeline


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

In this 11-video course, learners can explore policy requirements and guidelines setting implementation standards for security requirements specified in the baseline IT security policy, and the role, approaches, and tools needed to implement and apply security in DevOps. Other key topics covered here include essential components for building logging and auditing pipelines; steps involved in implementing mature DevOps security model; and demonstrating how to control and manage permissions granted to user in GitHub (a Git repository hosting company) and Docker Hub. You will learn essential security features of Jenkins that will secure continuous build pipelines, along with the role of security in DevOps workflow, for continuous integration and continuous development (CI/CD) implementation. Next, learn how to implement continuous security in DevOps pipelines. You will explore the need for test-driven security in applications, infrastructure and automated DevOps pipelines, along with components used to build logging and auditing pipelines. Finally, discover how to control permissions in GitHub and how to manage permissions in Docker Hub, along with the security features of Jenkins.



Expected Duration (hours)
0.9

Lesson Objectives

DevOps Security Considerations: Securing DevOps Pipeline

  • discover the key concepts covered in this course
  • describe policy requirements and the guidelines that set the implementation standard for the security requirements specified in the baseline IT security policy
  • recognize the role of security in DevOps when building and developing the DevOps workflow to implement CI/CD processes
  • describe the implementation of continuous security in DevOps pipelines, with a focus on test-driven development, monitoring, responding to attacks, assessing risks, and maturing security
  • recognize the need for applying test-driven security on applications, infrastructure, and automated DevOps pipelines
  • describe components that can be used to build logging and auditing pipelines
  • recall the tools and processes that can be used to apply security for DevOps-compliant processes in order to manage intrusion and incident responses
  • control permissions granted to users in GitHub and manage permissions in Docker Hub
  • configure Jenkins security features to secure continuous build pipelines
  • recognize the steps involved in implementing mature a DevOps security model that can help assess risks and facilitate continuous security
  • summarize the key concepts covered in this course
  • Course Number:
    it_dosecdj_01_enus

    Expertise Level
    Intermediate