<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>DevSecOps on Sven Ruppert</title><link>https://sven-ruppert.info/categories/devsecops/</link><description>Recent content in DevSecOps on Sven Ruppert</description><generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>sven.ruppert@gmail.com (Sven Ruppert)</managingEditor><webMaster>sven.ruppert@gmail.com (Sven Ruppert)</webMaster><copyright>© 2026 Sven Ruppert</copyright><lastBuildDate>Sat, 10 Dec 2022 21:56:43 +0000</lastBuildDate><atom:link href="https://sven-ruppert.info/categories/devsecops/index.xml" rel="self" type="application/rss+xml"/><item><title>Introduction to the Linux Foundation's SLSA project</title><link>https://sven-ruppert.info/posts/introduction-to-the-linux-foundations-slsa-project/</link><pubDate>Sat, 10 Dec 2022 21:56:43 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/introduction-to-the-linux-foundations-slsa-project/</guid><description>&lt;p&gt;Supply Chain Security is a hot topic these days. And more and more, we as developers are dealing with this daily. But what does this mean for us, and how is this influencing our job? I want to give an overview of common attacks against the Software Supply Chain from the developer&amp;rsquo;s view and will introduce the Open Source project SLSA from the Linux Foundation.&lt;/p&gt;</description></item><item><title>The Power of #JFrog Build Info (Build Metadata)</title><link>https://sven-ruppert.info/posts/the-power-of-jfrog-build-info-build-metadata/</link><pubDate>Fri, 08 Oct 2021 13:42:05 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/the-power-of-jfrog-build-info-build-metadata/</guid><description>&lt;p&gt;&lt;strong&gt;Intro&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This article will take a detailed look at what the term build-info is all about and why it will help us protect against attacks such as the Solarwinds Hack.&lt;/p&gt;</description></item><item><title>SolarWinds hack and the Executive Order from Mr Biden -- And now?</title><link>https://sven-ruppert.info/posts/solarwinds-hack-and-the-executive-order-from-mr-biden-and-now/</link><pubDate>Tue, 27 Jul 2021 11:10:15 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/solarwinds-hack-and-the-executive-order-from-mr-biden-and-now/</guid><description>&lt;p&gt;&lt;a href="https://open.spotify.com/show/0rZHMLs9fWq1G0Q2DAQbc3" target="_blank" rel="noreferrer"&gt;&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt=""
 src="https://sven-ruppert.info/images/spotify-badge.svg"
 &gt;&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;In the past two years, we have had to learn a lot about cybersecurity. The new attack vectors are becoming more and more sophisticated and are directed more and more against the value chain in general. But what does that mean for us? What can be done about it, and what reactions have the state already taken?&lt;/p&gt;</description></item><item><title>What is the difference between SAST, DAST, IAST and RASP?</title><link>https://sven-ruppert.info/posts/what-is-the-difference-between-sast-dast-iast-and-rasp/</link><pubDate>Mon, 19 Jul 2021 15:34:30 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/what-is-the-difference-between-sast-dast-iast-and-rasp/</guid><description>&lt;p&gt;&lt;a href="https://open.spotify.com/show/0rZHMLs9fWq1G0Q2DAQbc3" target="_blank" rel="noreferrer"&gt;&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt=""
 src="https://sven-ruppert.info/images/spotify-badge.svg"
 &gt;&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Intro:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In this post, we&amp;rsquo;re going to look at the differences between the various cybersecurity defence techniques. Here you can identify four main groups, which we will go through briefly one after another to illustrate the advantages and disadvantages.&lt;/p&gt;</description></item><item><title>The Lifeline of a Vulnerability</title><link>https://sven-ruppert.info/posts/the-lifeline-of-a-vulnerability/</link><pubDate>Fri, 25 Jun 2021 16:17:29 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/the-lifeline-of-a-vulnerability/</guid><description>&lt;p&gt;&lt;a href="https://open.spotify.com/show/0rZHMLs9fWq1G0Q2DAQbc3" target="_blank" rel="noreferrer"&gt;&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt=""
 src="https://sven-ruppert.info/images/spotify-badge.svg"
 &gt;&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;

&lt;h2 class="relative group"&gt;Intro
 &lt;div id="intro" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#intro" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;Again and again, we read something in the IT news about security gaps that have been found. The more severe the classification of this loophole, the more attention this information will get in the general press. Most of the time, you don&amp;rsquo;t even hear or read anything about all the security holes found that are not as well known as the SolarWinds Hack, for example. But what is the typical lifeline of such a security gap?&lt;/p&gt;</description></item><item><title>CVSS - explained - the Basics</title><link>https://sven-ruppert.info/posts/cvss-explained-the-basics/</link><pubDate>Wed, 07 Apr 2021 12:20:21 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/cvss-explained-the-basics/</guid><description>&lt;p&gt;&lt;a href="https://open.spotify.com/show/0rZHMLs9fWq1G0Q2DAQbc3" target="_blank" rel="noreferrer"&gt;&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt=""
 src="https://sven-ruppert.info/images/spotify-badge.svg"
 &gt;&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;

&lt;h3 class="relative group"&gt;Intro
 &lt;div id="intro" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#intro" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;p&gt;What is the Common Vulnerability Scoring System short called CVSS, who is behind it, what are we doing with it and what a CVSS Value means for you? I will explain how a CVSS Score is calculated, what the different elements of it mean and what are the differences between the different CVSS versions.&lt;/p&gt;</description></item><item><title>A Challenge of the Software Distribution</title><link>https://sven-ruppert.info/posts/a-challenge-of-the-software-distribution/</link><pubDate>Sun, 14 Feb 2021 14:03:57 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/a-challenge-of-the-software-distribution/</guid><description>&lt;p&gt;&lt;a href="https://open.spotify.com/show/0rZHMLs9fWq1G0Q2DAQbc3" target="_blank" rel="noreferrer"&gt;&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt=""
 src="https://sven-ruppert.info/images/spotify-badge.svg"
 &gt;&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;

&lt;h3 class="relative group"&gt;The four factors that are working against us
 &lt;div id="the-four-factors-that-are-working-against-us" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#the-four-factors-that-are-working-against-us" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;p&gt;Software development is more and more dependent on Dependencies and the frequency of deployments is increasing. Both trends together are pushing themselves higher. Another element that turns the delivery of software into a network bottleneck is the usage of compounded artefacts. And the last trend that is working against us, is the exploding amount of edges or better-called edge nodes.All four trends together are a challenge for the infrastructure.But what we could do against it?&lt;/p&gt;</description></item><item><title>DevSecOps - Be Independent Again</title><link>https://sven-ruppert.info/posts/devsecops-be-independent-again/</link><pubDate>Fri, 12 Feb 2021 18:06:03 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/devsecops-be-independent-again/</guid><description>&lt;p&gt;&lt;a href="https://open.spotify.com/show/0rZHMLs9fWq1G0Q2DAQbc3" target="_blank" rel="noreferrer"&gt;&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt=""
 src="https://sven-ruppert.info/images/spotify-badge.svg"
 &gt;&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;What do the effects the news of the last few months can have to do with risk management and the presumption of storage, and why is it an elementary component of DevSecOps?&lt;/p&gt;</description></item><item><title>The quick Wins of DevSecOps</title><link>https://sven-ruppert.info/posts/the-quick-wins-of-devsecops/</link><pubDate>Thu, 28 Jan 2021 16:56:45 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/the-quick-wins-of-devsecops/</guid><description>&lt;p&gt;Hello and welcome to my DevSecOps post. Here in Germany, it&amp;rsquo;s winter right now, and the forests are quiet. The snow slows down everything, and it&amp;rsquo;s a beautiful time to move undisturbed through the woods.&lt;/p&gt;</description></item></channel></rss>