{"id":14654,"date":"2018-12-10T13:40:56","date_gmt":"2018-12-10T12:40:56","guid":{"rendered":"http:\/\/s197371217.websitehome.co.uk\/?post_type=product&p=14654"},"modified":"2022-06-29T05:15:22","modified_gmt":"2022-06-29T09:15:22","slug":"best-use-of-security-in-a-devops-project","status":"publish","type":"product","link":"https:\/\/devopsnews.online\/product\/best-use-of-security-in-a-devops-project\/","title":{"rendered":"Best Use of Security in a DevOps Project"},"content":{"rendered":"
\n
\n
\n
\n
\n
\n
Awarded to the DevOps project with the best use of security.<\/p>\n
Judges will be looking for:<\/strong><\/p>\n
\n
Demonstration of effective security planning and implementation, from inception, to maintenance and monitoring in a project<\/li>\n
Verification of project goals, importance, achievements and successful results, with metrics and empirical evidence<\/li>\n
Evidence of collaboration with teams to review risks as well as implement and maintain appropriate controls<\/li>\n
Proof of overcoming project challenges and obstacles<\/li>\n
Detailed discussion around project methodology and justification of tooling\/resource choices<\/li>\n
Evidence of commitment to industry best practices and standards<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"
Awarded to the DevOps project with the best use of security. Judges will be looking for: Demonstration of effective security planning and implementation, from inception, to maintenance and monitoring in a project Verification of project goals, importance, achievements and successful results, with metrics and empirical evidence Evidence of collaboration with teams to review risks as…<\/p>\n","protected":false},"featured_media":24237,"template":"","meta":{"content-type":"","pmpro_default_level":""},"product_cat":[3272],"product_tag":[],"yoast_head":"\n
Best Use of Security in a DevOps Project - DevOps Online North America<\/title>\n\n\n\n\n\n\n\n\n\n\n\t\n\t\n\t\n\n\n