DoD CIO Enterprise DevSecOps Reference Design - Summaryrather than blacklisting. Services that support the security sidecar include: 1. Program-specific Log Storage and Retrieval Service 2. Service Mesh 3. Program-specific artifact repository 4. Runtime0 码力 | 8 页 | 3.38 MB | 5 月前3
No Silver Bullet – Essence and Accident in Software Engineeringsecurity I need… • a Container scanning and monitoring service, and to monitor it more I need… • a Log Aggregation and Search service, but to install it I need… • root access on a bunch of servers, but0 码力 | 35 页 | 1.43 MB | 5 月前3
The DevOps HandbookOUR CENTRALIZED TELEMETRY INFRASTRUCTURE i. Remove the silos of information – Developers don’t just log what’s interesting to development. Operations don’t just monitor what’s up or down. ii. Modern Monitoring0 码力 | 8 页 | 24.02 KB | 5 月前3
The DevOps HandbookCreating performance testing environments can easily be more complex than the application itself iv. Log performance results and evaluate compared to previous results l. INTEGRATE NON-FUNCTIONAL REQUIREMENTS0 码力 | 8 页 | 23.08 KB | 5 月前3
MITRE Defense Agile Acquisition Guide - Mar 2014[user role], I want to [goal], so I can [reason].24 For example, “As a registered user, I want to log in so I can access subscriber-only content.” User stories should have the following characteristics:0 码力 | 74 页 | 3.57 MB | 5 月前3
共 5 条
- 1













