|
|
G.1.4 Deliver provenance
|
|
|
P.4.2 Automated security scanning tools
|
|
|
E.1.1 Safely store release artifacts
|
|
|
E.2.1 Release policy verification
|
|
|
E.2.4 CI/CD hosting and automation
|
|
|
E.2.5 Secured orchestration platform
|
|
|
E.2.7 Build output
|
|
|
E.3.5 Baseline configuration
|
|
|
E.3.6 Monitor changes to configuration settings
|
|
|
E.3.9 Ephemeral credentials
|
|
|
D.2.1 System monitoring
|
|
|
E.3.x Development Environment Scanning Tools
|