« Cybersécurité Agile - Cartographie des technologies/en » : différence entre les versions
Page créée avec « Technology mapping - Agile cybersecurity » |
Page créée avec « <div class="divIframe"> <iframe src="https://wiki.campuscyber.fr/images/f/f2/Cybers%C3%A9curit%C3%A9_Agile_Carto_technologies_VF.pdf" width="1000" height="800" allow="fullscreen" ></iframe> </div> » |
||
| (8 versions intermédiaires par le même utilisateur non affichées) | |||
| Ligne 5 : | Ligne 5 : | ||
|Status=Production | |Status=Production | ||
}} | }} | ||
== Description== | == Description== | ||
Within the Cyber Campus, the Agile Cybersecurity Working Group was set up to study best practices and the transformations needed to achieve a good level of security in agile development cycles. Three areas of work were identified, which led to three projects within the group. | |||
# Governance | |||
# | |||
# Security Champions & SME | # Security Champions & SME | ||
# Technologies | # Technologies | ||
This document is the main deliverable of the third project, known as “Technologies.” | |||
Discussions and interviews with stakeholders in the community of interest formed around this topic highlighted the importance of technology in the transformation under discussion. | |||
It is clear that certain security activities, identified in particular in the work of the Governance project, require the implementation of specific tools. This is the case, for example, with automated security analysis activities in the application lifecycle, such as SAST or DAST. | |||
This document summarizes the discussions and work carried out by the Agile Cybersecurity - Stream Technologies working group and has two main objectives: | |||
* Present a map of technologies of interest in the context | |||
* | * Provide guidance to support organizations' choices | ||
* | |||
< | <span id="Téléchargement"></span> | ||
== | == Download == | ||
[https://wiki.campuscyber.fr/images/f/f2/Cybers%C3%A9curit%C3%A9_Agile_Carto_technologies_VF.pdf Téléchargez le livrable au format pdf] | [https://wiki.campuscyber.fr/images/f/f2/Cybers%C3%A9curit%C3%A9_Agile_Carto_technologies_VF.pdf Téléchargez le livrable au format pdf] | ||
<div class="divIframe"> | <div class="divIframe"> | ||
<iframe | <iframe | ||
| Ligne 52 : | Ligne 34 : | ||
allow="fullscreen" | allow="fullscreen" | ||
></iframe> | ></iframe> | ||
</div> | </div> | ||
{{PageSubHeader Commun | {{PageSubHeader Commun | ||
|WorkGroup=Cybersécurité Agile : Technologies | |WorkGroup=Cybersécurité Agile : Technologies | ||
}} | }} | ||
Dernière version du 13 octobre 2025 à 09:05
Cartographie des technologies - Cybersécurité Agile
Catégorie : Commun Statut : Production 1 : Idée - 2 : Prototype - 3 : Validation - 4 : Production
Description
Within the Cyber Campus, the Agile Cybersecurity Working Group was set up to study best practices and the transformations needed to achieve a good level of security in agile development cycles. Three areas of work were identified, which led to three projects within the group.
- Governance
- Security Champions & SME
- Technologies
This document is the main deliverable of the third project, known as “Technologies.”
Discussions and interviews with stakeholders in the community of interest formed around this topic highlighted the importance of technology in the transformation under discussion. It is clear that certain security activities, identified in particular in the work of the Governance project, require the implementation of specific tools. This is the case, for example, with automated security analysis activities in the application lifecycle, such as SAST or DAST.
This document summarizes the discussions and work carried out by the Agile Cybersecurity - Stream Technologies working group and has two main objectives:
- Present a map of technologies of interest in the context
- Provide guidance to support organizations' choices
Download
Téléchargez le livrable au format pdf