Technical debt sonarqube
Thank you for your interest. If you wish to apply for a position outside of India, please reach out to your referrer to start a new referral process by referring you for the position in the desired country. You will now be redirected to India Jobs Portal to explore other opportunities within India.
ResponsibilitiesApplication Security Testing professional duties and responsibilities of the role will be:Although not all of them are required, breadth and depth of skills are expected, and will be valued, for this role: #GoSecurity
Work where you are inspired to explore your passions, where your talents are enhanced. Innovate with the most cutting-edge technologies in the market by working on the most innovative projects you can imagine.
Our more than 600,000 professionals in over 120 countries combine unmatched experience and expertise in more than 40 industries. We drive change to create value and shared success for each of our customers, people, shareholders, partners and communities.
ShareSecurity when working in DevOps processes is crucial. Currently, there is a great risk of introducing vulnerabilities in the applications we develop by using third-party libraries. We can give our teams all we want in terms of secure development, but if they use a vulnerable library, we compromise the entire application. In this post, we discuss some options that exist to minimize this risk.
During the month of February, we have been collaborating to help one of our customers to include security in their DevOps pipeline. Their main interest has been for us to introduce an analysis process in open source libraries to verify the following:
To work in an automatic and effective way, we have been looking at different tools from different vendors, and we have identified a couple of workflows to achieve our goal:
As you can see, when we start the pipeline execution, we are incorporating a scan of the open source libraries. The different tools will identify them and check their internal databases to find any vulnerabilities they may have, as well as to verify their license and check if they comply with policies that we define ourselves.
I have the following setup: create multiple workers, do a calculation and terminate them after the calculation is done. So each time it will be a different instance running the task, so each host will have its own log file, resulting in a …
I am using AWS Code Pipeline, Code Build to create a new Docker container and bring it into ECR. My application is a simple single container based container. What would be a lower friction approach to extract the current Container and relaunch a new Container from the ECS registry …
The cost of AWS Lambda depends on how long a function executes and to some extent the memory footprint. Having functions that terminate faster and consume less memory can save quite a bit of money. Especially when such a function runs often. How do you tune a function …
If you’ve ever been bitten by an add-in update that broke some functions, you must have given some thought to this problem: What should the Jenkins add-in update policy be? How do you test changes before implementing them? Has anyone gone so far as to have an instance of …