Skip to content

Commit f070162

Browse files
Update docs/security/sdlc.md
1 parent 370b065 commit f070162

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/security/sdlc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,4 @@ Starting with activities such as threat modeling and risk assessments, Polygon L
44

55
Continuous integration and continuous deployment (CI/CD) activities are enforced in all code repositories, which implement automated security testing and scanning tools into the CI/CD pipeline to detect vulnerabilities early in the development process.
66

7-
Following development and testing phases, all applications expected to go into production are further tested via internal or external assessments such as penetration testing, security audits and bug bounty programs. These efforts help validate the effectiveness of our security controls, detect weaknesses, and address them before they can be exploited by malicious actors.
7+
Following development and testing phases, all applications expected to go into production are further tested via internal or external assessments such as penetration testing, security audits, and bug bounty programs. These efforts help validate the effectiveness of our security controls, detect weaknesses, and address them before they can be exploited by malicious actors.

0 commit comments

Comments
 (0)