Part 3:Technology
This part introduces you to continuous integration and continuous deployment, as well as aspects of setting up a DevSecOps environment.
This part has the following chapters:
- Chapter 6, Continuous Integration and Continuous Deployment
- Chapter 7, Threat Modeling
- Chapter 8, Software Composition Analysis (SCA)
- Chapter 9, Static Application Security Testing (SAST)
- Chapter 10, Infrastructure-as-Code (IaC) Scanning
- Chapter 11, Dynamic Application Security Testing (DAST)