From 0a4595438874bb2d8e5b0ef04e70c2200dcb9dba Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Thu, 14 May 2026 20:31:14 +0000 Subject: [PATCH] chore: update docs/devsecops.md [20260514-2029] --- docs/devsecops.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/docs/devsecops.md b/docs/devsecops.md index 74d1ad35..8e6f9159 100644 --- a/docs/devsecops.md +++ b/docs/devsecops.md @@ -232,6 +232,7 @@ - [devops.com: DevOps Security: Your Complete Checklist](https://devops.com/devops-security-your-complete-checklist) ## Authentication and Authorization + - [Configure Microsoft Entra for Increased Security](https://learn.microsoft.com/en-us/entra/fundamentals/configure-security) - *(Related to kubernetes-security topic)* - [thenewstack.io: How Do Authentication and Authorization Differ?](https://thenewstack.io/how-do-authentication-and-authorization-differ/) - [==osohq.com: Patterns for Authorization in Microservices==](https://www.osohq.com/post/microservices-authorization-patterns) @@ -289,6 +290,7 @@ - [github.com/yannh/kubeconform 🌟](https://github.com/yannh/kubeconform) **A FAST Kubernetes manifests validator, with support for Custom Resources!** ## IaC and Security + - [Automating Microsoft Sentinel Deployment with Azure DevOps CI/CD](https://noodlemctwoodle.medium.com/automating-microsoft-sentinel-deployment-with-azure-devops-ci-cd-2d4ae0c4e254) - *(Related to azure topic)* - [thenewstack.io: Security Insights into Infrastructure-as-Code](https://thenewstack.io/security-insights-into-infrastructure-as-code/) @@ -780,4 +782,5 @@ to restrict any unwanted, malicious behavior of cloud-native workloads at runtim

End to End Encryption Explained#infosec #cybersecurity #pentesting #oscp #informationsecurity #hacking #cissp #redteam #technology #DataSecurity #CyberSec #Hackers #tools #bugbountytips #Linux #infosec #itsecurity #cybersecuritytips #securitybreach #encryption pic.twitter.com/eejf8JL9VF

— Shubham Sharma (@Shubham_pen) February 13, 2022

Critical Log Review Checklist For Security Incidents - by @SANSInstitute #infosec #cybersecurity #pentesting #oscp #informationsecurity #hacking #cissp #redteam #technology #DataSecurity #CyberSec #Hackers #tools #bugbountytips #Linux #infosec #itsecurity #cybersecuritytips pic.twitter.com/4zWIq1pkYO

— Shubham Sharma (@Shubham_pen) February 13, 2022
-
\ No newline at end of file + + - [Kubernetes Security Best Practices: A DevSecOps Perspective](https://www.linkedin.com/top-content/career/) - This LinkedIn post discusses the challenges women face in advancing their careers in asset management, particularly concerning promotion decisions during childbearing years. It highlights how career interruptions and childcare responsibilities can disproportionately affect women's earnings and career progression. The author also touches on the career risks associated with pregnancy for women in new roles. \ No newline at end of file