<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: ISmile Technologies</title>
    <description>The latest articles on DEV Community by ISmile Technologies (@ismiletechnology).</description>
    <link>https://dev.to/ismiletechnology</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5849%2Fed0fc3d2-700b-41ce-a57c-eea5f8687fab.png</url>
      <title>DEV Community: ISmile Technologies</title>
      <link>https://dev.to/ismiletechnology</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/ismiletechnology"/>
    <language>en</language>
    <item>
      <title>Get Free Cloud ROI Assesment Workshop</title>
      <dc:creator>iSmileTechnologies</dc:creator>
      <pubDate>Tue, 20 Sep 2022 19:32:51 +0000</pubDate>
      <link>https://dev.to/ismiletechnology/get-free-cloud-roi-assesment-workshop-3a5g</link>
      <guid>https://dev.to/ismiletechnology/get-free-cloud-roi-assesment-workshop-3a5g</guid>
      <description>&lt;p&gt;Assessing the ROI of private cloud and PaaS is more complex and often unclear, thus measuring the impact of Cloud ROI is an important step for an organisation to optimize its cloud investment.  &lt;/p&gt;

&lt;p&gt;When it comes to cloud migration, CIO’s would like to assess cloud migration cost vs on-premises infrastructure cost as per their digital transformation road-map and operational continuity of their organization. &lt;/p&gt;

&lt;p&gt;In this 60-minute workshop, you will get :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;An analysis of your existing workload and applications for cloud migration and current cost structures. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detailed assessment report with recommendations with an assessment report to help you to decide your Cloud ROI and readiness. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Cloud Readiness Assessment for your business by understanding your business case for cloud movement.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Compliance &amp;amp; Operating Process. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Operational costs optimization.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Schedule here: &lt;a href="https://www.ismiletechnologies.com/cloud-roi-assessment-workshop/"&gt;https://www.ismiletechnologies.com/cloud-roi-assessment-workshop/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>javascript</category>
      <category>programming</category>
      <category>productivity</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Integrate Security Into the SDLC</title>
      <dc:creator>iSmileTechnologies</dc:creator>
      <pubDate>Fri, 26 Aug 2022 10:18:51 +0000</pubDate>
      <link>https://dev.to/ismiletechnology/integrate-security-into-the-sdlc-5b9o</link>
      <guid>https://dev.to/ismiletechnology/integrate-security-into-the-sdlc-5b9o</guid>
      <description>&lt;p&gt;&lt;strong&gt;Open Source Vulnerability Scanning&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Most software projects contain thousands of external dependencies. Many of these are open source components which could contain security vulnerabilities, may have been created without security best practices, or which may have potential licensing issues once incorporated into a project. &lt;/p&gt;

&lt;p&gt;Open source vulnerability scanning – also known as software composition analysis (SCA) – analyzes open source components, libraries, and their dependencies present in the analyzed codebase. Any detected open source artifacts are identified by their version, distribution, source, common platform enumeration (CPE), and other distinguishing characteristics. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Scanning in development:&lt;/strong&gt; Developers can automatically be notified of security issues in components they are including. They can then make faster, informed decisions on how to address or avoid introducing these risks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Scanning in security testing:&lt;/strong&gt;** Any component with vulnerabilities that exceed a predefined risk threshold should raise an alert and be inspected before deployment to production. These alerts can trigger remediation activities from development teams or be reviewed and prioritized by security teams.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Scanning in production and pre-production:&lt;/strong&gt;** Any new vulnerabilities or risks that enter the application after security review can be detected, alerted upon, and addressed. This includes risks from artifacts that entered the project through means other than the SDLC or CI/CD pipeline, zero-day vulnerabilities, and malware.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Benefits of &lt;a href="https://www.ismiletechnologies.com/devsecops-managed-services/"&gt;DevSecOps Managed Services&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Increased collaboration between all teams - development, security, and operations&lt;/li&gt;
&lt;li&gt;Threat Modeling &amp;amp; Architecture reviews help eliminate security threats and Vulnerabilities at an early stage in the lifecycle&lt;/li&gt;
&lt;li&gt;Achieve greater agility and speed while designing a future-proof system for scaling&lt;/li&gt;
&lt;li&gt;Opportunities for quality assurance testing and automated builds wherever possible&lt;/li&gt;
&lt;li&gt;Automatic inbuilt Security of Code&lt;/li&gt;
&lt;li&gt;Continuous Security Enablement at all stages in the lifecycle&lt;/li&gt;
&lt;li&gt;Extensive experience with most modern security implementation tools like Kubernetes, Docker, Jenkins, and Datadog&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>devops</category>
      <category>security</category>
      <category>devjournal</category>
      <category>programming</category>
    </item>
    <item>
      <title>Getting Started with Compliance as Code</title>
      <dc:creator>iSmileTechnologies</dc:creator>
      <pubDate>Fri, 12 Aug 2022 13:30:20 +0000</pubDate>
      <link>https://dev.to/ismiletechnology/getting-started-with-compliance-as-code-3dhg</link>
      <guid>https://dev.to/ismiletechnology/getting-started-with-compliance-as-code-3dhg</guid>
      <description>&lt;p&gt;Another area where the shift-left trend is well-established is Compliance with regulations and self-imposed obligations. Your team may produce a secure, low-risk Code faster by integrating Compliance into your workflow and using Compliance as a code approach. On the road to production, Compliance as code techniques ensures that the proper regulatory or corporate compliance standards are completed without human intervention. It incorporates Compliance into both operations and development. &lt;/p&gt;

&lt;p&gt;By defining how resources must be configured, Compliance with code technologies gives stakeholders the ability to guarantee that production processes are compliant. These solutions can frequently automatically adapt resources into a compliant state to satisfy these pre-established compliance standards thanks to such a framework. &lt;/p&gt;

&lt;p&gt;For large businesses, especially those subject to complicated legislation, this kind of minimal-friction Compliance is an essential solution (such as enterprises operating in healthcare or financial services). Compliance can be incorporated into the DevOps lifecycle to improve workflow and save developers valuable review and testing time. &lt;/p&gt;

&lt;p&gt;How do you put Compliance into practice? &lt;/p&gt;

&lt;p&gt;Management, Compliance, internal audit, PMO, and infosec leaders must come together to define Compliance as code policies at the outset. Together, they will create the rules and manage the workflows. Throughout the pipeline, management must know how operational hazards and other risks will be managed. &lt;/p&gt;

&lt;p&gt;How your team is organized will affect how your firm establishes Compliance with code regulations, but transparency is necessary regardless of how your teams work together. Consider implementing the following rules to make sure information is shared, and choices are taken jointly: &lt;/p&gt;

&lt;p&gt;Peer reviews: The first review cycle for bigger changes should be manual to ensure no modifications are made without at least one other person checking the change. To guarantee the quality of the review, reviewers can be allocated at random. &lt;/p&gt;

&lt;p&gt;Static application security testing: In addition to human reviews, every code update should undergo static (or white box) testing. &lt;/p&gt;

&lt;p&gt;Review by subject-matter specialists for high-risk Code: Changes should be reviewed by a subject matter expert for Code that the management team identifies as high-risk (such as security code). &lt;/p&gt;

&lt;p&gt;Regulated access restrictions: Management must maintain access controls to prevent modifications from being made by a single engineer and to ensure that each change is processed via the workflow and is accessible to anybody with access to the dashboard. &lt;/p&gt;

&lt;p&gt;The Function of Compliance as a Code &lt;/p&gt;

&lt;p&gt;People typically create compliance rules with a non-technical background in brief, simple language that is simple to understand. Still, for it to function, the rules must be converted from the non-technical format to Code. Compliance as a Code means that the developer must transform the requirements and rules into machine-readable Code. This conversion's primary goal is to separate compliance standards' definition, application, and enforcement from the Code. &lt;/p&gt;

&lt;p&gt;Examining the Code and any new changes are carried out with Compliance as Code tools, which cause the proper actions to be triggered whenever a change occurs. Tools monitor code changes and application modifications to ensure that nothing new compromises the Compliance of the regulations. OPA is one of the most well-liked and effective compliance solutions available today (Open Policy Agent). &lt;/p&gt;

&lt;p&gt;Why is Compliance with the Code required? &lt;/p&gt;

&lt;p&gt;The biggest advantage of adhering to the Code is that you can create tests instead of configuration. You can be more specific when developing tests than writing or authoring Code. &lt;/p&gt;

&lt;p&gt;Here are four reasons why firms require Compliance with a code: &lt;/p&gt;

&lt;p&gt;CI/CD pipeline and Compliance as a code &lt;/p&gt;

&lt;p&gt;Greater visibility of the various rules evaluated at each stage of the software development life cycle is made possible with compliance-as-code aid. The security team can better assess the risks when compliance-as-code techniques like shift-left security are used early in the software development lifecycle. Additionally, early adjustments made by the development team can result in on-time delivery, cut cycle time, and enable both teams to work more quickly. &lt;/p&gt;

&lt;p&gt;A compliance audit trail and Code &lt;/p&gt;

&lt;p&gt;Using Compliance-as-a-Service to validate and audit compliance Code, which relies on programmatic techniques, aids in achieving a very high degree of precision. Scalability is also easier even in cloud environments; when Compliance depends on manual processes, the results may be too error-prone because humans tend to make mistakes. The provided programmatic techniques can be scaled up to fit the environment and verify compliance status if the environment is scaled up. Thus, it is relatively simple to create process repeatability, which lowers the overall effort needed to deploy and maintain compliant workloads. &lt;/p&gt;

&lt;p&gt;The gap in Compliance Knowledge &lt;/p&gt;

&lt;p&gt;Compliance-as-code made it a mandate to include controls and compliance standards in various business operations. It aids in closing the knowledge gap in Compliance. Prioritizing the compliance activities is also beneficial. For illustration, suppose one of your automatic reports provides a list of 20 non-compliant programs. As a result, you can quickly order them according to how urgently your company needs them. Additionally, it simplifies the routine reporting process and aids in achieving transparency over the entire compliance process so that management can monitor it easily. &lt;/p&gt;

&lt;p&gt;Agile with Compliance as the standard &lt;/p&gt;

&lt;p&gt;When using compliance-as-code, all of the checks are automated, and the compliance rules are written as Code. Therefore, you may rapidly rerun your compliance checks to confirm the compliance status following minor adjustments. Additionally, it offers programmatically defined automatic evidence gathering, which simplifies audit planning and evaluation. The ability to test, version, and group compliance rules into bundles, known as compliance bundles, is one of the major benefits of having compliance rules written as a Code. To improve the visibility of the compliance status, compliance infractions can also be gathered, presented, and reported to a central dashboard. &lt;/p&gt;

&lt;p&gt;Conclusion &lt;/p&gt;

&lt;p&gt;Management, Compliance, internal audit, development, and implementation are all brought by Compliance as a code. All interested parties must collaborate to define the compliance and control policies and rules. Managers must be aware of the procedures for managing operational risks and other pipeline hazards. Possibility of incorporating their specifications into the Code so that their organizations can access those artifacts on their teams at scale and, ultimately, allow Compliance to be another quality assurance component in the software you deliver. It is wise to regularly check on the systems' Compliance and to show external or internal auditors proof of this check-up. &lt;/p&gt;

</description>
      <category>javascript</category>
      <category>webdev</category>
      <category>programming</category>
      <category>tutorial</category>
    </item>
  </channel>
</rss>
