inflearn logo
inflearn logo

DevSecOps Basic (/w SAST)

What is DevSecOps? Configure a CI build environment and an environment that automatically performs SAST checks during build

(4.7) 7 reviews

82 learners

Level Beginner

Course period Unlimited

CI/CD
CI/CD
sast
sast
SonarQube
SonarQube
Jenkins
Jenkins
grafana
grafana
CI/CD
CI/CD
sast
sast
SonarQube
SonarQube
Jenkins
Jenkins
grafana
grafana
날개 달린 동전

Recommend Course to grow and earn commission!

날개 달린 동전

Marketing Partners

Recommend Course to grow and earn commission!

What you will gain after the course

  • What is DevSecOps?

  • DevSecOps Models

  • CI/CD Pipeline SAST automatic inspection environment configuration

I've heard a lot about DevSecOps, but what exactly is it?

You can set goals for what a DevSecOps environment is and what efforts you should put into building it!

Security teams want to leverage DevOps (CI/CD) environments, but aren't sure where to start!

  • A self-assessment and goal-setting method presented using various DevSecOps criteria.

  • Example environment configuration using open source (Github, Jenkins, SonarQube, etc.) for configuring a DevSecOps environment

Learning Content

  • It was created with a focus on the basics of DevSecOps and setting up a practical environment.

  • Section 1: What is DevSecOps? , DevSecOps Models

  • Section 2: Configuring a CI Environment and Automated SAST (Source Code Vulnerability Checking) Scanning Environment in a CI Environment

  • Section 3: Monitoring Measures

Section (1) DevSecOps Basic

Let's take a look at what DevSecOps is and how to plan for its implementation in your environment.

We review DevSecOps models proposed by various overseas companies and present our own assessment and future plans.

Section (2) CI & SAST

This hands-on exercise demonstrates how to implement automated SAST (Source Code Vulnerability Scanning Tool) inspection to apply Sec in a DevOps environment.

  • Tools used: Jenkins & Github

Section (3) Monitor

We propose a monitoring plan to ensure normal operation after SAST automatic inspection.

  • Tools used: Prometheus & Grafana

Practice environment

  • Operating System and Version (OS): The environment in which Docker runs (Windows, Linux OSX, Mac, etc.)

  • Tools used: Docker Desktop

  • PC specifications: A practical environment will be created using a total of five Docker images. Any specifications that can run approximately five Docker containers simultaneously are sufficient.

Learning Materials

  • Lecture materials are provided in PDF format, and the code required for practice is provided in the attached files for each lecture.


Player Knowledge and Precautions

  • This article primarily introduces a method for building an automated SAST/DAST vulnerability inspection environment based on a CI/CD pipeline for building a DevSecOps environment.

  • Since we cannot cover all the various SAST/DAST tools, such as reducing false positive rates and improving detection rules for SAST/DAST, we would appreciate it if you could provide information based on the automated DevSecOps environment configuration.
    - We plan to continue producing a series of lectures on the topic of DevSecOps, and we plan to additionally write basic content on reducing false positives or enhancing detection rules based on open source tools (e.g. SonarQube, ZAP).


Recommended for
these people

Who is this course right for?

  • Anyone who wants to build a DevSecOps environment in their company

  • Anyone who is thinking about how to set goals and plans for building DevSecOps

Hello
This is taesun1114

660

Learners

53

Reviews

12

Answers

4.5

Rating

6

Courses

Reviews

All

7 reviews

4.7

7 reviews

  • cindy02276721님의 프로필 이미지
    cindy02276721

    Reviews 2

    Average Rating 5.0

    5

    30% enrolled

    • simonkim95님의 프로필 이미지
      simonkim95

      Reviews 2

      Average Rating 5.0

      5

      100% enrolled

      I really enjoyed the lecture on gitlab - sast (sonarqube) integration. I was at a loss as to how to integrate SAST tools into the ci/cd process at my company. This lecture seems to have given me some direction. Although the tool we'll be adopting isn't sonarqube, it will be very helpful for communicating with tool vendors.

      • lakescript님의 프로필 이미지
        lakescript

        Reviews 1

        Average Rating 5.0

        5

        100% enrolled

        They fully captured the core concepts of a CI pipeline that can be configured in practice. In particular, the tips on how to apply other security tools besides SonarQube, which was used in the practical session, during additional lectures were also very good. However, it would have been nice if there was a bit of theory on other security tools, including SonarQube! Nevertheless, it was a very substantial lecture. Thank you.

        • neobus71742389님의 프로필 이미지
          neobus71742389

          Reviews 11

          Average Rating 5.0

          5

          30% enrolled

          • abcd123123님의 프로필 이미지
            abcd123123

            Reviews 328

            Average Rating 5.0

            5

            26% enrolled

            taesun1114's other courses

            Check out other courses by the instructor!

            Similar courses

            Explore other courses in the same field!

            $51.70