« Cybersécurité Agile - Cartographie des technologies/en » : différence entre les versions
Page créée avec « Discussions and interviews with stakeholders in the community of interest formed around this topic highlighted the importance of technology in the transformation under discussion. It is clear that certain security activities, identified in particular in the work of the Governance project, require the implementation of specific tools. This is the case, for example, with automated security analysis activities in the application lifecycle, such as SAST or DAST. » |
Page créée avec « This document summarizes the discussions and work carried out by the Agile Cybersecurity - Stream Technologies working group and has two main objectives: » |
||
| Ligne 17 : | Ligne 17 : | ||
It is clear that certain security activities, identified in particular in the work of the Governance project, require the implementation of specific tools. This is the case, for example, with automated security analysis activities in the application lifecycle, such as SAST or DAST. | It is clear that certain security activities, identified in particular in the work of the Governance project, require the implementation of specific tools. This is the case, for example, with automated security analysis activities in the application lifecycle, such as SAST or DAST. | ||
This document summarizes the discussions and work carried out by the Agile Cybersecurity - Stream Technologies working group and has two main objectives: | |||
<div lang="fr" dir="ltr" class="mw-content-ltr"> | <div lang="fr" dir="ltr" class="mw-content-ltr"> | ||
Version du 13 octobre 2025 à 09:05
Cartographie des technologies - Cybersécurité Agile
Catégorie : Commun Statut : Production 1 : Idée - 2 : Prototype - 3 : Validation - 4 : Production
Description
Within the Cyber Campus, the Agile Cybersecurity Working Group was set up to study best practices and the transformations needed to achieve a good level of security in agile development cycles. Three areas of work were identified, which led to three projects within the group.
- Governance
- Security Champions & SME
- Technologies
This document is the main deliverable of the third project, known as “Technologies.”
Discussions and interviews with stakeholders in the community of interest formed around this topic highlighted the importance of technology in the transformation under discussion. It is clear that certain security activities, identified in particular in the work of the Governance project, require the implementation of specific tools. This is the case, for example, with automated security analysis activities in the application lifecycle, such as SAST or DAST.
This document summarizes the discussions and work carried out by the Agile Cybersecurity - Stream Technologies working group and has two main objectives:
- Présenter une cartographie des technologies d'intérêt dans le contexte
- Donner des orientations pour accompagner les choix des organisations
Téléchargement