![]() ![]() Testing (SAST) to check your source code for known vulnerabilities. If you’re using GitLab CI/CD, you can use Static Application Security The whitepaper “A Seismic Shift in Application Security”Įxplains how 4 of the top 6 attacks were application based. Static Application Security Testing (SAST) ![]() Configure certificate checking of packages.Set SAST CI/CD variables to use local SAST analyzers.If support for Custom Certificate Authorities are needed.Make GitLab SAST analyzer images available inside your Docker registry.Running jobs in merge request pipelines.Using a CI/CD variable to pass username and password to a private Maven repository.Using a CI/CD variable to pass username and password to a private Go repository.Using CI/CD variables to pass credentials for private repositories.Configure SAST with default settings only.Enable multi-project support for Security Code Scan. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |