« Cybersécurité Agile - Cartographie des technologies/en » : différence entre les versions
Page créée avec « This document is the main deliverable of the third project, known as “Technologies.” » |
Page créée avec « Discussions and interviews with stakeholders in the community of interest formed around this topic highlighted the importance of technology in the transformation under discussion. It is clear that certain security activities, identified in particular in the work of the Governance project, require the implementation of specific tools. This is the case, for example, with automated security analysis activities in the application lifecycle, such as SAST or DAST. » |
||
| Ligne 14 : | Ligne 14 : | ||
This document is the main deliverable of the third project, known as “Technologies.” | This document is the main deliverable of the third project, known as “Technologies.” | ||
Discussions and interviews with stakeholders in the community of interest formed around this topic highlighted the importance of technology in the transformation under discussion. | |||
It is clear that certain security activities, identified in particular in the work of the Governance project, require the implementation of specific tools. This is the case, for example, with automated security analysis activities in the application lifecycle, such as SAST or DAST. | |||
<div lang="fr" dir="ltr" class="mw-content-ltr"> | <div lang="fr" dir="ltr" class="mw-content-ltr"> | ||
Version du 13 octobre 2025 à 09:05
Cartographie des technologies - Cybersécurité Agile
Catégorie : Commun Statut : Production 1 : Idée - 2 : Prototype - 3 : Validation - 4 : Production
Description
Within the Cyber Campus, the Agile Cybersecurity Working Group was set up to study best practices and the transformations needed to achieve a good level of security in agile development cycles. Three areas of work were identified, which led to three projects within the group.
- Governance
- Security Champions & SME
- Technologies
This document is the main deliverable of the third project, known as “Technologies.”
Discussions and interviews with stakeholders in the community of interest formed around this topic highlighted the importance of technology in the transformation under discussion. It is clear that certain security activities, identified in particular in the work of the Governance project, require the implementation of specific tools. This is the case, for example, with automated security analysis activities in the application lifecycle, such as SAST or DAST.
Ce document synthétise les réflexions et travaux menés par le groupe de travail Cybersécurité Agile - Stream technologies et poursuit deux objectifs principaux :
- Présenter une cartographie des technologies d'intérêt dans le contexte
- Donner des orientations pour accompagner les choix des organisations
Téléchargement