Security Practices

How teams operationalize security throughout the SDLC.

8 articles
Security Practices

What is Container Security?

Container security encompasses practices for protecting containerized applications from build time through runtime, including image scanning, runtime policies, and network isolation.

5 min read
Security Practices

What is Infrastructure as Code Security?

Infrastructure as Code security applies security scanning and policy enforcement to IaC templates, catching misconfigurations before they are provisioned in cloud environments.

5 min read
Security Practices

What is Memory Safety?

Memory safety refers to protections that prevent programs from accessing memory in undefined or unintended ways, eliminating entire classes of security vulnerabilities.

5 min read
Security Practices

What is Secrets Detection?

Secrets detection automatically scans code, commits, and configuration files to identify hardcoded credentials before they reach version control or production.

5 min read
Security Practices

What is Secrets Management?

Secrets management is the practice of securely storing, accessing, rotating, and auditing credentials, API keys, and other sensitive configuration values.

5 min read
Security Practices

What is Supply Chain Security?

Supply chain security protects software from threats introduced through third-party code, build tools, and infrastructure used to create and deliver applications.

5 min read
Security Practices

What is Vulnerability Management?

Vulnerability management is the continuous process of identifying, classifying, remediating, and mitigating security weaknesses in software and infrastructure.

5 min read
Security Practices

What is Zero Trust Security?

Zero trust is a security model that requires continuous verification of every user, device, and connection, eliminating implicit trust based on network location.

5 min read