@@ -46,35 +46,35 @@ However, when using CI/CD tools to provide automation, keep in mind that the too
4646 - [ 1-2-Training] ( current-version/1-People/1-2-Training )
4747 - [ 1-2-1-Secure-coding] ( current-version/1-People/1-2-Training/1-2-1-Secure-coding.md )
4848 - [ 1-2-2-Security-CICD] ( current-version/1-People/1-2-Training/1-2-2-Security-CICD.md )
49- - [ 2-Tools ] ( current-version/2-Tools )
50- - [ 2-1-Design] ( current-version/2-Tools /2-1-Design )
51- - [ 2-1-1-Threat-modeling] ( current-version/2-Tools /2-1-Design/2-1-1-Threat-modeling.md )
52- - [ 2-2-Code] ( current-version/2-Tools /2-2-Code )
53- - [ 2-2-3-Interactive-Application-Security-Testing] ( current-version/2-Tools /2-2-Code/2-2-3-Interactive-Application-Security-Testing.md )
54- - [ 2-2-1-Pre-commit] ( current-version/2-Tools /2-2-Code/2-2-1-Pre-commit )
55- - [ 2-2-1-1-Pre-commit] ( current-version/2-Tools /2-2-Code/2-2-1-Pre-commit/2-2-1-1-Pre-commit.md )
56- - [ 2-2-1-2-Secrets-Management] ( current-version/2-Tools /2-2-Code/2-2-1-Pre-commit/2-2-1-2-Secrets-Management.md )
57- - [ 2-2-1-3-Linting-code] ( current-version/2-Tools /2-2-Code/2-2-1-Pre-commit/2-2-1-3-Linting-code.md )
58- - [ 2-2-1-4-Repository-Hardening] ( current-version/2-Tools /2-2-Code/2-2-1-Pre-commit/2-2-1-4-Repository-Hardening.md )
59- - [ 2-2-2-Static-Analysis] ( current-version/2-Tools /2-2-Code/2-2-2-Static-Analysis )
60- - [ 2-2-2-1-Static-Application-Security-Testing] ( current-version/2-Tools /2-2-Code/2-2-2-Static-Analysis/2-2-2-1-Static-Application-Security-Testing.md )
61- - [ 2-2-2-2-Software-Composition-Analysis] ( current-version/2-Tools /2-2-Code/2-2-2-Static-Analysis/2-2-2-2-Software-Composition-Analysis.md )
62- - [ 2-2-2-3-Infastructure-as-Code-Scanning] ( current-version/2-Tools /2-2-Code/2-2-2-Static-Analysis/2-2-2-3-Infastructure-as-Code-Scanning.md )
63- - [ 2-2-2-4-Container-Security] ( current-version/2-Tools /2-2-Code/2-2-2-Static-Analysis/2-2-2-4-Container-Security )
64- - [ 2-2-2-4-1-Container-Scanning] ( current-version/2-Tools /2-2-Code/2-2-2-Static-Analysis/2-2-2-4-Container-Security/2-2-2-4-1-Container-Scanning.md )
65- - [ 2-2-2-4-2-Container-Hardening] ( current-version/2-Tools /2-2-Code/2-2-2-Static-Analysis/2-2-2-4-Container-Security/2-2-2-4-2-Container-Hardening.md )
66- - [ 2-3-Build] ( current-version/2-Tools /2-3-Build )
67- - [ 2-3-1-Dynamic-Application-Security-Testing] ( current-version/2-Tools /2-3-Build/2-3-1-Dynamic-Application-Security-Testing.md )
68- - [ 2-3-2-Mobile-Application-Security-Test] ( current-version/2-Tools /2-3-Build/2-3-2-Mobile-Application-Security-Test.md )
69- - [ 2-3-3-API-Security] ( current-version/2-Tools /2-3-Build/2-3-3-API-Security.md )
70- - [ 2-3-4-Miss-Configuration-Check] ( current-version/2-Tools /2-3-Build/2-3-4-Miss-Configuration-Check.md )
71- - [ 2-4-Operation] ( current-version/2-Tools /2-4-Operation )
72- - [ 2-4-1-Cloud-Native-Security] ( current-version/2-Tools /2-4-Operation/2-4-1-Cloud-Native-Security.md )
73- - [ 2-4-2-Logging-and-Monitoring] ( current-version/2-Tools /2-4-Operation/2-4-2-Logging-and-Monitoring.md )
74- - [ 2-4-3-Pentest] ( current-version/2-Tools /2-4-Operation/2-4-3-Pentest.md )
75- - [ 2-4-4-Vulnerability-Management] ( current-version/2-Tools /2-4-Operation/2-4-4-Vulnerability-Management.md )
76- - [ 2-4-5-VDP|Bug-bounty] ( current-version/2-Tools /2-4-Operation/2-4-5-VDP|Bug-bounty.md )
77- - [ 2-4-6-Breach-and-attack-simulation] ( current-version/2-Tools /2-4-Operation/2-4-6-Breach-and-attack-simulation.md )
49+ - [ 2-Process ] ( current-version/2-Process )
50+ - [ 2-1-Design] ( current-version/2-Process /2-1-Design )
51+ - [ 2-1-1-Threat-modeling] ( current-version/2-Process /2-1-Design/2-1-1-Threat-modeling.md )
52+ - [ 2-2-Code] ( current-version/2-Process /2-2-Code )
53+ - [ 2-2-3-Interactive-Application-Security-Testing] ( current-version/2-Process /2-2-Code/2-2-3-Interactive-Application-Security-Testing.md )
54+ - [ 2-2-1-Pre-commit] ( current-version/2-Process /2-2-Code/2-2-1-Pre-commit )
55+ - [ 2-2-1-1-Pre-commit] ( current-version/2-Process /2-2-Code/2-2-1-Pre-commit/2-2-1-1-Pre-commit.md )
56+ - [ 2-2-1-2-Secrets-Management] ( current-version/2-Process /2-2-Code/2-2-1-Pre-commit/2-2-1-2-Secrets-Management.md )
57+ - [ 2-2-1-3-Linting-code] ( current-version/2-Process /2-2-Code/2-2-1-Pre-commit/2-2-1-3-Linting-code.md )
58+ - [ 2-2-1-4-Repository-Hardening] ( current-version/2-Process /2-2-Code/2-2-1-Pre-commit/2-2-1-4-Repository-Hardening.md )
59+ - [ 2-2-2-Static-Analysis] ( current-version/2-Process /2-2-Code/2-2-2-Static-Analysis )
60+ - [ 2-2-2-1-Static-Application-Security-Testing] ( current-version/2-Process /2-2-Code/2-2-2-Static-Analysis/2-2-2-1-Static-Application-Security-Testing.md )
61+ - [ 2-2-2-2-Software-Composition-Analysis] ( current-version/2-Process /2-2-Code/2-2-2-Static-Analysis/2-2-2-2-Software-Composition-Analysis.md )
62+ - [ 2-2-2-3-Infastructure-as-Code-Scanning] ( current-version/2-Process /2-2-Code/2-2-2-Static-Analysis/2-2-2-3-Infastructure-as-Code-Scanning.md )
63+ - [ 2-2-2-4-Container-Security] ( current-version/2-Process /2-2-Code/2-2-2-Static-Analysis/2-2-2-4-Container-Security )
64+ - [ 2-2-2-4-1-Container-Scanning] ( current-version/2-Process /2-2-Code/2-2-2-Static-Analysis/2-2-2-4-Container-Security/2-2-2-4-1-Container-Scanning.md )
65+ - [ 2-2-2-4-2-Container-Hardening] ( current-version/2-Process /2-2-Code/2-2-2-Static-Analysis/2-2-2-4-Container-Security/2-2-2-4-2-Container-Hardening.md )
66+ - [ 2-3-Build] ( current-version/2-Process /2-3-Build )
67+ - [ 2-3-1-Dynamic-Application-Security-Testing] ( current-version/2-Process /2-3-Build/2-3-1-Dynamic-Application-Security-Testing.md )
68+ - [ 2-3-2-Mobile-Application-Security-Test] ( current-version/2-Process /2-3-Build/2-3-2-Mobile-Application-Security-Test.md )
69+ - [ 2-3-3-API-Security] ( current-version/2-Process /2-3-Build/2-3-3-API-Security.md )
70+ - [ 2-3-4-Miss-Configuration-Check] ( current-version/2-Process /2-3-Build/2-3-4-Miss-Configuration-Check.md )
71+ - [ 2-4-Operation] ( current-version/2-Process /2-4-Operation )
72+ - [ 2-4-1-Cloud-Native-Security] ( current-version/2-Process /2-4-Operation/2-4-1-Cloud-Native-Security.md )
73+ - [ 2-4-2-Logging-and-Monitoring] ( current-version/2-Process /2-4-Operation/2-4-2-Logging-and-Monitoring.md )
74+ - [ 2-4-3-Pentest] ( current-version/2-Process /2-4-Operation/2-4-3-Pentest.md )
75+ - [ 2-4-4-Vulnerability-Management] ( current-version/2-Process /2-4-Operation/2-4-4-Vulnerability-Management.md )
76+ - [ 2-4-5-VDP|Bug-bounty] ( current-version/2-Process /2-4-Operation/2-4-5-VDP|Bug-bounty.md )
77+ - [ 2-4-6-Breach-and-attack-simulation] ( current-version/2-Process /2-4-Operation/2-4-6-Breach-and-attack-simulation.md )
7878- [ 3-Governance] ( current-version/3-Governance )
7979 - [ 3-2-Data-protection] ( current-version/3-Governance/3-2-Data-protection.md )
8080 - [ 3-1-Compliance-Auditing] ( current-version/3-Governance/3-1-Compliance-Auditing )
@@ -86,7 +86,5 @@ However, when using CI/CD tools to provide automation, keep in mind that the too
8686 - [ 3-3-2-Central-vulnerability-management-dashboard] ( current-version/3-Governance/3-3-Reporting/3-3-2-Central-vulnerability-management-dashboard.md )
8787
8888
89-
90-
9189---
9290The project page on the OWASP website is [ here] ( https://owasp.org/www-project-devsecops-guideline/ )
0 commit comments