Research Library

The top resource for free research, white papers, reports, case studies, magazines, and eBooks.

Share Your Content with Us
on TradePub.com for readers like you. LEARN MORE
CI/CD Attack Scenarios: How to Protect Your Production Environment

Request Your Free On-Demand Webinar Now:

"CI/CD Attack Scenarios: How to Protect Your Production Environment"

Brought to you in partnership with Prisma Cloud by Palo Alto Networks

Automating systems like CI/CD processes have enabled engineers to ship code more quickly, but this change has also created multiple new avenues for attackers to reach production assets.

From bypassing branch protection rules, to more complex attack scenarios like Poisoned Pipeline Execution - attackers have found that CI/CD is a quick way to invoke malicious attacks on production environments and gain control. 

This talk will walk you through some of the more common (and complex!) attack scenarios in CI/CD pipelines, and what you can do to ensure your delivery pipeline doesn't become the entry point for attackers.


Offered Free by: DZone
See All Resources from: DZone

Recommended for Professionals Like You: