logo

DevOps Principles and Practices

4 Pages713 Words73 Views
   

Added on  2020-12-01

DevOps Principles and Practices

   Added on 2020-12-01

ShareRelated Documents
Nova Southeastern UniversityCollege of Engineering and ComputingWinter 2020 - Master LevelCISC 640 Operating SystemResearch Paper
DevOps Principles and Practices_1
DevOps is a set of principles and practices to improve collaboration between development and IT Operations [2]. The whole process falls under the DevOps operation, from system management to application maintenance to server and application control. DevOps is an activity that relies predominantly on continuous integration and continuous deployment. The developers commit their code using Git and use Jenkins to compile the committed code and generate a project. Then the implementation and the program are reviewed and the code is then applied to the development environment following acceptance. When it comes to confidentiality, the servers are covered by an acceptable certificate authority with SSL security. Under DevOps, these servers should be properly patched and updated. In addition, the phase of data cleaning can also be part of the repair section. The servers should be managed every weekend and there should be an automatic servicing process.There are some ways to ensure data security in DevOps:DevSecOps model [1]: a culture shift in the software industry that aims to bake security into the rapid-release cycles that are typical of modern application development and deployment, also known as the DevOps movement. Embracing this shift-left mentality requires organizations to bridge the gap that usually exists between development and securityteams to the point where many of the security processes are automated and handled by the development team itself.Security Policies [4]: security policies and governance are essential for ensuring the consistent management of security risks. We can establish a clear, easy-to-understand set of policies and procedures for cybersecurity functions like access controls, configuration management, code review, vulnerability testing, and firewalling. All personnel should be familiar with these security protocols, and you should maintain operational visibility so you can keep track of compliance.
DevOps Principles and Practices_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Contemporary World Application 2022
|10
|541
|10

Advanced Digital Forensics: Shellcode, Exploits, and Intrusion Detection
|12
|2801
|294

Grading System Security
|11
|2603
|96

Security Measures for Hybrid Cloud Implementation
|14
|3889
|22

Vulnerability Assessment and Risk Management for Business Continuity
|7
|2478
|153

Cloud Computing: Models, Characteristics, and Benefits
|10
|569
|175