Table of Contents
About the Authors
Intro
Problem State
DevSecOps Recommendations
Base Infrastructure Decisions
Key Security Considerations
Identity and Access Management (IAM): The First Line of Defense!
Security Architecture
Patch Management: Then and Now
Logging and Monitoring
Incident Management
Application Security
Securing the Business
Awareness
Training
Physical Security
Measuring for Success
Cooperation and Generative Culture
In Closing