Skip to content

Commit a42ead4

Browse files
committed
provide content for DevSecOps Guideline
1 parent 063f83b commit a42ead4

File tree

4 files changed

+49
-8
lines changed

4 files changed

+49
-8
lines changed

_data/draft.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -299,7 +299,7 @@ docs:
299299
url: operation
300300

301301
- title: '9.1 DevSecOps Guideline'
302-
url: operations/devsecops
302+
url: operations/devsecops_guideline
303303

304304
- title: '9.2 Coraza Web Application Firewall'
305305
url: operations/coraza_waf

_data/release.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -299,7 +299,7 @@ docs:
299299
url: operation
300300

301301
- title: '9.1 DevSecOps Guideline'
302-
url: operations/devsecops
302+
url: operations/devsecops_guideline
303303

304304
- title: '9.2 Coraza Web Application Firewall'
305305
url: operations/coraza_waf

draft/04-foundations/02-secure-development.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -97,10 +97,10 @@ There are many OWASP tools and resources to help build security into the SDLC.
9797
within the development teams - ideally every team should have a security champion that has
9898
a special interest in security and has received further training, enabling the team to build security in.
9999

100-
* **Operation**: the OWASP [DevSecOps Guideline][devsecops] explains how to best implement a secure pipeline,
101-
using best practices and introducing automation tools to help 'shift-left'.
100+
* **Operations**: the OWASP [DevSecOps Guideline][devsecops] explains how to best implement a secure pipeline,
101+
using best practices and automation tools to help 'shift-left' security issues.
102102
Refer to the DevSecOps Guideline for more information on any of the topics within DevSecOps
103-
and in particular sections on Operation.
103+
and in particular sections on Operations.
104104

105105
* **Supply chain**: attacks that leverage the supply chain can be devastating
106106
and there have been several high profile of products being successfully exploited.

draft/11-operations/01-devsecops.md

Lines changed: 44 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,23 +6,54 @@ tags: OWASP Developer Guide
66
contributors: Jon Gadsden
77
document: OWASP Developer Guide
88
order: 1101
9-
permalink: /draft/operations/devsecops/
9+
permalink: /draft/operations/devsecops_guideline/
1010

1111
---
1212

1313
{% include breadcrumb.html %}
1414

1515
### 9.1 DevSecOps Guideline
1616

17-
The [OWASP DevSecOps Guideline][devsecops] project
17+
The OWASP [DevSecOps Guideline][devsecops] project explains how to best implement a secure pipeline,
18+
using best practices and introducing automation tools to help 'shift-left' security issues.
19+
1820
The DevSecOps Guideline is in active development as an OWASP Production documentation project
21+
and can be accessed from the [web document][dsodoc] or [downloaded as a PDF][dsopdf].
1922

2023
#### What is the DevSecOps Guideline?
2124

22-
#### Why use the DevSecOps Guideline?
25+
The DevOps (combining software Development and release Operations) pipelines use automation to integrate
26+
various established activities within the development and release processes into pipeline steps.
27+
This enables the use of Continuous integration / Continuous Delivery/Deployment (CI/CD) within an organization.
28+
DevSecOps (combining security with DevOps) seeks to add steps into the existing CI/CD pipelines to build security
29+
into the development and release process.
30+
31+
The [DevSecOps Guideline][devsecops] is a collection of advice and theory that explains how to embed security into DevOps.
32+
It covers various foundational topics such as Threat Modeling pipelines, Secrets Management and Linting Code.
33+
It then explains and illustrates various vulnerability scanning steps commonly used in CI/CD pipelines:
34+
35+
* Static Application Security Testing ([SAST][dsosast])
36+
* Dynamic Application Security Testing ([DAST][dsodast])
37+
* Interactive Application Security Testing ([IAST][dsoiast])
38+
* Software Composition Analysis ([SCA][dsosca])
39+
* [Infrastructure Vulnerability Scanning][dsocvs]
40+
* [Container Vulnerability Scanning][dsoivs]
41+
42+
The DevSecOps Guideline is a concise guide that provides the foundational knowledge to implement DevSecOps.
2343

2444
#### How to use the DevSecOps Guideline
2545

46+
The DevSecOps Guideline is document can be accessed from the [web document][dsodoc] or [downloaded as a PDF][dsopdf].
47+
It is concise enough that all the sections can be read within a short time, and it provides enough knowledge
48+
to understand the concept behind DevSecOps and what activities are involved.
49+
50+
It provides an [excellent overview][dsointro] of DevSecOps which shows how the steps of a typical CI/CD pipeline
51+
fit together and what sort of tools can be applied in each step to secure the pipeline.
52+
Many of the pages in the DevSecOps Guideline contain lists of tools that can be applied to the pipeline step.
53+
54+
The DevSecOps Guideline document is in the process of [being expanded and updated][dsonew] which will build on the
55+
existing 2023 version.
56+
2657
----
2758

2859
The OWASP Developer Guide is a community effort; if there is something that needs changing
@@ -31,5 +62,15 @@ then [submit an issue][issue1101] or [edit on GitHub][edit1101].
3162
[edit1101]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/11-operations/01-devsecops.md
3263
[issue1101]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2011-operations/01-devsecops
3364
[devsecops]: https://owasp.org/www-project-devsecops-guideline/
65+
[dsocvs]: https://owasp.org/www-project-devsecops-guideline/latest/02f-Container-Vulnerability-Scanning
66+
[dsodoc]: https://owasp.org/www-project-devsecops-guideline/latest/
67+
[dsodast]: https://owasp.org/www-project-devsecops-guideline/latest/02b-Dynamic-Application-Security-Testing
68+
[dsoiast]: https://owasp.org/www-project-devsecops-guideline/latest/02c-Interactive-Application-Security-Testing
69+
[dsointro]: https://owasp.org/www-project-devsecops-guideline/latest/index
70+
[dsoivs]: https://owasp.org/www-project-devsecops-guideline/latest/02e-Infrastructure-Vulnerability-Scanning
71+
[dsonew]: https://github.com/OWASP/DevSecOpsGuideline/tree/master/documents
72+
[dsopdf]: https://github.com/OWASP/DevSecOpsGuideline/releases
73+
[dsosast]: https://owasp.org/www-project-devsecops-guideline/latest/02a-Static-Application-Security-Testing
74+
[dsosca]: https://owasp.org/www-project-devsecops-guideline/latest/02d-Software-Composition-Analysis
3475

3576
\newpage

0 commit comments

Comments
 (0)