Overview
Syllabus
Introduction
Ikkas background
Jenkins vulnerability
Jenkins mitigation
How many Jenkins instances
What is the real cause
Main Central Repository
MITRE Database
Verizon Database
Compound risks
How to prevent this
Standards
PCI DSS
Compliance Ease Security
Supply Chains
Deming
transitive dependencies
Control the quality of your suppliers
Software delivery pipeline
Missing component
Standardization
Catalog Control Point
Leverage Automation
Onion Model of Testing
Security
Rugged Software Factory
Bill of Materials
Reverse Engineering
Leadership
Testdriven development
References
Scaling
Taught by
OWASP Foundation