Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Continuous Testing, Quality, Security, and Feedback

You're reading from   Continuous Testing, Quality, Security, and Feedback Essential strategies and secure practices for DevOps, DevSecOps, and SRE transformations

Arrow left icon
Product type Paperback
Published in Sep 2024
Publisher Packt
ISBN-13 9781835462249
Length 350 pages
Edition 1st Edition
Languages
Concepts
Arrow right icon
Author (1):
Arrow left icon
Marc Hornbeek Marc Hornbeek
Author Profile Icon Marc Hornbeek
Marc Hornbeek
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Part 1: Understanding Continuous Testing, Quality, Security, and Feedback FREE CHAPTER
2. Chapter 1: Principles of Continuous Testing, Quality, Security, and Feedback 3. Chapter 2: The Importance of Continuous Testing, Quality, Security, and Feedback 4. Chapter 3: Experiences and Pitfalls with Continuous Testing, Quality, Security, and Feedback 5. Part 2: Determining Solutions Priorities
6. Chapter 4: Engineering Approach to Continuous Testing, Quality, Security, and Feedback 7. Chapter 5: Determining Transformation Goals 8. Chapter 6: Discovery and Benchmarking 9. Chapter 7: Selecting Tool Platforms and Tools 10. Chapter 8: Applying AL/ML to Continuous Testing, Quality, Security, and Feedback 11. Part 3: Deep Dive into Roadmaps, Implementation Patterns, and Measurements
12. Chapter 9: Use Cases for Integrating with DevOps, DevSecOps, and SRE 13. Chapter 10: Building Roadmaps for Implementation 14. Chapter 11: Understanding Transformation Implementation Patterns 15. Chapter 12: Measuring Progress and Outcomes 16. Part 4: Exploring Future Trends and Continuous Learning
17. Chapter 13: Emerging Trends 18. Chapter 14: Exploring Continuous Learning and Improvement 19. Glossary and References 20. Index 21. Other Books You May Enjoy

Roadmap for continuous security

With cybersecurity threats on the rise, this section highlights the necessity of embedding security practices into every stage of development. It provides a blueprint for a proactive security posture, ensuring that products are not only functional but also secure against potential threats.

There is no standard roadmap because every organization and application has unique current state and future state priorities for continuous security.

Figure 10.5 is an example of a roadmap for continuous security. In this example, the organization’s current state of continuous security was assessed to be a level 2 capability, continuous integration, and the desired goal for the organization is to transform to level 4, continuous deployment.

Figure 10.5 – Roadmap for continuous security (example)

Figure 10.5 – Roadmap for continuous security (example)

The roadmap has two project themes:

  • Theme P1, to transform continuous security practices from level 2, continuous...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime