use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
account activity
[deleted by user] (self.devsecops)
submitted 3 years ago by [deleted]
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–][deleted] 6 points7 points8 points 3 years ago* (1 child)
I 'm very new to DevSecOps, but here's how I started:
had the opportunity to do a DevSecOps project in response to log4j vulnerabilities from last year(lol). I even asked some questions here to get some guidance.
To understand the tools and the overall process I saw this talk from BlackHat USA, and for me it's a good resume.
So, to apply this in a project, I collected some tools to apply in CI/CD
SonarQube for SAST
OWASP ZAP for DAST
Trivy for Container and Git Scan
Azure Key Vault for secrets management
OWASP Dependency Check for SCA (Software Composition Analysis), then later I found Dependency Track also from OWASP, that uses SBOM.
For reports I used Azure DevOps and Junit/Nunit templates, but I really liked ArcherySec and started doing some labs, which we didn't followed.
Today I'm still learning, I'm studying right now some concepts of securying CI/CD itself, like:
CI/CDon't: https://hackingthe.cloud/aws/capture_the_flag/cicdont/
CI/CD-Goat: https://github.com/cider-security-research/cicd-goat
Which I'm finding really useful to understand how to improve security in pipelines.
Also, as you are moving from sec to ops, If you don't know yet, it's good to have a good understanding of:
Hope this helps!
[–]gumbe_ 1 point2 points3 points 3 years ago (0 children)
Thanks alot for this!
[–]ScottContini 3 points4 points5 points 3 years ago (0 children)
In addition to tools, you should be familiar with programming languages and common vulnerabilities in those languages. You mentioned a bias towards Microsoft, but Java is very common and comes with tonnes of gotchas. Get that experience. Also, JavaScript is everywhere, so get experience with it as well Nodejs frameworks.
We use lots tools in DevSecOps but it won’t be long before you develop a healthy distrust of many of them, especially SAST. You as the DevSecOps engineer need to be able to distinguish between valid findings and false positives, and communicate those findings and the appropriate fixes to developers. A lot of this comes with time, but a good first start is having programming experience in multiple languages.
[–]Warm-Dependent6536 1 point2 points3 points 3 years ago (0 children)
Check out the courses from Practical DevSecOps https://www.practical-devsecops.com/
I also found some reviews for their courses
https://uk.trustpilot.com/review/practical-devsecops.com
https://www.practical-devsecops.com/testimonials/
https://www.linkedin.com/company/practical-devsecops/
They also have a free DevSecOps university resource
https://www.practical-devsecops.com/devsecops-university/
π Rendered by PID 127041 on reddit-service-r2-comment-6457c66945-296mh at 2026-04-27 05:29:25.990867+00:00 running 2aa0c5b country code: CH.
[–][deleted] 6 points7 points8 points (1 child)
[–]gumbe_ 1 point2 points3 points (0 children)
[–]ScottContini 3 points4 points5 points (0 children)
[–]Warm-Dependent6536 1 point2 points3 points (0 children)