Applying Governance
to CI/CD eBook

Pipeline patterns ebook

Applying Governance to CI/CD

In the SolarWinds hack of 2020, FireEye, a cybersecurity vendor, announced an intrusion that resulted in the theft of over 300 proprietary security tools offered by the vendor. SolarWinds, an IT monitoring vendor, had pushed malicious code to over 18,000 customers, including Fortune 500 companies and large federal agencies, including the U.S. Department of Homeland Security (DHS), Microsoft, and NASA. Following this announcement, security experts launched an investigation into the hack, putting the Software Development Life Cycle (SDLC) and all its processes under review. Download this ebook today to learn how to apply governance to your CI/CD process.

Download the report to learn key findings including:

  • The role of CI/CD and its potential impacts on events like the SolarWinds hack

  • How to apply IT Governance principles and practices to CI/CD pipelines

  • And how to use these CI/CD capabilities to the reduce and mitigate software risks

Download for Free

By signing up, you agree to our Privacy Policy and our Terms of Use.

Pipeline Patterns Extracted Pages