Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Continuous Testing, Quality, Security, and Feedback

You're reading from   Continuous Testing, Quality, Security, and Feedback Essential strategies and secure practices for DevOps, DevSecOps, and SRE transformations

Arrow left icon
Product type Paperback
Published in Sep 2024
Publisher Packt
ISBN-13 9781835462249
Length 350 pages
Edition 1st Edition
Languages
Concepts
Arrow right icon
Author (1):
Arrow left icon
Marc Hornbeek Marc Hornbeek
Author Profile Icon Marc Hornbeek
Marc Hornbeek
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Part 1: Understanding Continuous Testing, Quality, Security, and Feedback
2. Chapter 1: Principles of Continuous Testing, Quality, Security, and Feedback FREE CHAPTER 3. Chapter 2: The Importance of Continuous Testing, Quality, Security, and Feedback 4. Chapter 3: Experiences and Pitfalls with Continuous Testing, Quality, Security, and Feedback 5. Part 2: Determining Solutions Priorities
6. Chapter 4: Engineering Approach to Continuous Testing, Quality, Security, and Feedback 7. Chapter 5: Determining Transformation Goals 8. Chapter 6: Discovery and Benchmarking 9. Chapter 7: Selecting Tool Platforms and Tools 10. Chapter 8: Applying AL/ML to Continuous Testing, Quality, Security, and Feedback 11. Part 3: Deep Dive into Roadmaps, Implementation Patterns, and Measurements
12. Chapter 9: Use Cases for Integrating with DevOps, DevSecOps, and SRE 13. Chapter 10: Building Roadmaps for Implementation 14. Chapter 11: Understanding Transformation Implementation Patterns 15. Chapter 12: Measuring Progress and Outcomes 16. Part 4: Exploring Future Trends and Continuous Learning
17. Chapter 13: Emerging Trends 18. Chapter 14: Exploring Continuous Learning and Improvement 19. Glossary and References 20. Index 21. Other Books You May Enjoy

AI/ML for continuous security

Implementing continuous security involves integrating proactive and reactive security measures seamlessly across the development, delivery, and operations life cycle. This approach is designed to minimize the frequency and impact of security events. Figure 8.6 illustrates key activities needed to achieve continuous security.

Figure 8.6 – AI/ML for continuous security activities

Figure 8.6 – AI/ML for continuous security activities

The following explains potential bottlenecks and how AI/ML can mitigate these challenges:

  1. Security requirements analysis:
    • Description: Defining and understanding the security requirements specific to the application and the environment it operates in.
    • Bottlenecks: Time-consuming analysis and potential for overlooking critical requirements.
    • AI/ML application: AI-powered tools can analyze project documentation and code to automatically identify security requirements and regulations applicable to the project, speeding up the process and reducing...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image