Home ALM Journal - Vol 4 - Num 12 - December 2015
ALM Journal -

 

 

Please subscribe to our new publication based upon our latest book on Agile Application Lifecycle Management (ALM) and Using DevOps to Drive Process Improvement!

Bob Aiello
http://www.linkedin.com/in/BobAiello

 

 

 

Vol 4 - Num 12 - December 2015
Articles
IBM developerworks DevOps Security
This article is Published on IBM developerworks as part of a series called DevOps Best Practices.   DevOps best practices: Part 2. Ensure robust and effective information security with DevOps DevOps principles, well known for helping developers and operations to work more effectively together, can be applied to information security, as well. Learn how DevOps can improve information security by applying industry-recognized best practices. Use the DevOps approach to keep systems secure, to prevent system glitches, and to ensure uninterrupted service. DevOps is a set of principles and practices that focus on improving communication and collaboration between...Read More >>
Baselining with Ruby
When you deploy a release you need to verify that the correct files were copied to the target directory as expected (often called a configuration audit). You also want to verify that unauthorized changes have not occurred (e.g. tampering with a release). I have used intrusion detection tools to protect my production baseline and verify that unauthorized changes did not occur. Another approach is to write cryptographic hashes on each configuration item and then check them to verify that the file has not been changed. This is known as creating an application baseline and here is...Read More >>
Verify Baselines wtih Ruby
In my previous article on Baselining with Ruby, I explained how to use cryptographic hashes (e.g. MAC SHA1) to create a configuration baseline. This article expands upon this topic to explain how to verify that the baseline has not changed. As mentioned in the previous article this is important because when you deploy a release you need to verify that the correct files were copied to the target directory as expected (often called a configuration audit). It is essential to verify that unauthorized changes have not occurred (e.g. tampering with a release). One way to do this is...Read More >>
Copyright © 2017 CM Best Practices. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.
 

Product News

Live Online Training

Jobs