(blue star) Overview

Most of the software security flaws were found at deployment implementations due to insecure configurations in the environment. Software security flaws can be introduced by:

  • Not identifying security requirements up front

  • Introducing flaws during maintenance or updating

(blue star)  Reviewing process with the checklists

The review process is simply cross-checking the implemented code with the checklist. The checklist were categorized per critical implementation checkpoints. Each of checkpoints were listed below:

Kubernetes Security

Microservices Security