1. Introduction
2.1 Build Agents in Azure (Self-hosted).html
2. Demo A Build, in Light of Security
3.1 Extending Builds in Jenkins.html
3.2 The Extends Keyword in Azure Builds.html
3. Engineering Secure Builds
4.1 SonarCloud.html
4. Demo A Build with Sonar Tools
5.1 The Mask Passwords Plug-in for Jenkins.html
5. Passwords and Secure Files in Builds
6. Authentication to Third-party Tools
7. Demo Establishing a Service Connection in Azure DevOps
8.1 More on SSO and SAML.html
8. SSO and Federation
9.1 3 ways to mitigate risk when using private package feeds.html
9.2 Dependency Confusion How I Hacked Into Apple, Microsoft and Dozens of Other Companies.html
9. Dependency Security
10. Summary
11. Introduction
12.1 Martin Fowler's Original Article on Immutable Server.html
12.2 Some Thoughts from a DevOps Professional on Immutable Server and Security.html
12. Immutable Server
13.1 Running Microservices on AWS.html
13. The Role of Containerization
14.1 Docker Desktop.html
14. Demo Containers, in Light of Security
15.1 CrowdStrike, on Achieving Security in Containers and Containerized Solutions.html
15.2 Desired State Configuration.html
15. Container Security
16.1 Convention over Configuration.html
16. Security and Application Configuration
17.1 Deploying to Container with Octopus.html
17. Deploying Securely
18. Summary
19. Introduction
20.1 A Case Study of Mere Security through Obscurity.html
20. Insecurity through Obscurity
21.1 A Real-world Example of Using Regular Expressions to Parse a Log.html
21. Demo Grepping a Log
22.1 A Curation of Some Cool Kibana Dashboards.html
22.2 Kibana Alerting.html
22.3 The GitHub Repo of ELK Examples.html
22. Logging and Dashboard Stacks
23. A Logging Strategy that Supports Interrogation
24. Summary
25. Making a Given Log Format Observable.html