2. Continuous Monitoring
|
Continuous Monitoring |
5 |
|
1. Continuous Monitoring
|
Continuous Monitoring |
5 |
|
1. VA
|
Vulnerability Assessment |
5 |
|
2. SCA
|
Software Composition Analysis |
5 |
|
1. SCA
|
Software Composition Analysis |
5 |
|
2. Pre-commit Hook
|
Pre-commit Hooks |
5 |
|
1. Pre-commit Hook
|
Pre-commit Hooks |
5 |
|
2. Vulnerability Management
|
Vulnerability Management |
5 |
|
1. Vulnerability Management
|
Vulnerability Management |
5 |
|
2. Need for DevSecOps
|
Need for DevSecOps |
5 |
|
1. Need for DevSecOps
|
Need for DevSecOps |
5 |
|
2. Secrets Management
|
Secrets Management |
5 |
|
1. Secrets Management
|
Secrets Management |
5 |
|
3. SAST
|
Static Analysis Security Testing |
5 |
|
2. SAST
|
Static Analysis Security Testing |
5 |
|
1. SAST
|
Static Analysis Security Testing |
5 |
|
3. DAST
|
Dynamic Analysis Security Testing |
5 |
|
2. DAST
|
Dynamic Analysis Security Testing |
5 |
|
1. DAST
|
Dynamic Analysis Security Testing |
5 |
|
1. CAC
|
Compliance As Code |
5 |
|
1. Container Security
|
Container Security |
5 |
|
1. DevOps Threat Modelling
|
DevOps Threat Modelling |
5 |
|
1. DevOps
|
DevOps |
5 |
|