Saafan

Add friend
Sign in to Goodreads to learn more about Saafan.


The Ultimate Hike...
Rate this book
Clear rating

 
AI Engineering: B...
Rate this book
Clear rating

 
See all 4 books that Saafan is reading…
Loading...
“here are some steps to identify and track code that should be reviewed carefully: Tagging user stories for security features or business workflows which handle money or sensitive data. Grepping source code for calls to dangerous function calls like crypto functions. Scanning code review comments (if you are using a collaborative code review tool like Gerrit). Tracking code check-in to identify code that is changed often: code with a high rate of churn tends to have more defects. Reviewing bug reports and static analysis to identify problem areas in code: code with a history of bugs, or code that has high complexity and low automated test coverage. Looking out for code that has recently undergone large-scale “root canal” refactoring. While day-to-day, in-phase refactoring can do a lot to simplify code and make it easier to understand and safer to change, major refactoring or redesign work can accidentally change the trust model of an application and introduce regressions.”
Laura Bell, Agile Application Security: Enabling Security in a Continuous Delivery Pipeline

“Automated systems can allow mistakes, errors, and attacks to be propagated and multiplied in far more damaging ways than manual systems. As the DevOps comedy account @DevOpsBorat says, “To make error is human. To propagate error to all server in automatic way is #devops.” 2 Furthermore, automated tooling is fallible; and as we know so well in the security world, it can be easy for humans to begin to trust in the computer and stop applying sense or judgment to the results. This can lead to teams trusting that if the tests pass, the system is working as expected, even if other evidence might indicate otherwise.”
Laura Bell, Agile Application Security: Enabling Security in a Continuous Delivery Pipeline

“Agile teams rely on automation heavily in order to get the speed, repeatability, and consistency that they need to keep moving forward. However automation itself comes with its own risks. The tools themselves can be the target of attack and an attack vector in themselves,”
Laura Bell, Agile Application Security: Enabling Security in a Continuous Delivery Pipeline

year in books
Scott W...
1,767 books | 199 friends

Nazly E...
536 books | 38 friends

Habiba
539 books | 110 friends

Mosab
569 books | 713 friends

Dareen
249 books | 53 friends

Andrew ...
126 books | 7 friends

Saad Ta...
166 books | 164 friends

Mostafa...
291 books | 306 friends

More friends…

Favorite Genres



Polls voted on by Saafan

Lists liked by Saafan