Rethink how you refine your pipeline. Join the discussion focused on turning raw CI/CD data into metrics that show efficiency levels.
Data quality isn't just a technical issue: It impacts an organization's compliance, operational efficiency, and customer satisfaction.
Technical security vulnerabilities, such as SQL injections, cross-site scripting, etc. come from coding errors. However, business logic vulnerabilities are due to mistakes in how the application was intended to work. Since the code was written properly, business logic vulnerabilities cannot be detected using traditional source code analysis techniques. Historically, the only way to find business logic vulnerabilities in development was via manual source code reviews, which does not scale to the pace of modern DevOps driven release cycles.
This webinar will demonstrate how to write custom queries of your source code to look for common business logic vulnerabilities such as:
-DoS attacks
-Authentication enforcement
-Data privacy compliance
-Encryption compliance
Next, the webinar will demonstrate how the custom queries can be automatically inserted into your DevOps pipeline via pull request, build or release.