You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Oct 14, 2020. It is now read-only.
Copy file name to clipboardExpand all lines: README.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,11 +16,17 @@
16
16
17
17
<!-- toc -->
18
18
19
+
-[Overview](#overview)
19
20
-[Purpose of this Project](#purpose-of-this-project)
20
21
-[Quickstart](#quickstart)
21
-
-[How Does it Work?](#how-does-it-work)
22
+
-[Prerequisites](#prerequisites)
23
+
-[Deployment](#deployment)
24
+
-[How does it work?](#how-does-it-work)
22
25
-[Architecture](#architecture)
23
-
-[Roadmap](#roadmap)
26
+
-[License](#license)
27
+
-[Community](#community)
28
+
-[Contributing](#contributing)
29
+
-[Author Information](#author-information)
24
30
25
31
For additional documentation aspects please have a look at our:
26
32
@@ -34,7 +40,7 @@ For additional documentation aspects please have a look at our:
34
40
The typical way to ensure application security is to hire a security specialist (aka penetration tester) at some point in your project to check the application for security bugs and vulnerabilities. Usually, this check is done at a later stage of the project and has two major drawbacks:
35
41
36
42
1. Nowadays, a lot of projects do continuous delivery, which means the developers deploy new versions multiple times each day. The penetration tester is only able to check a single snapshot, but some further commits could introduce new security issues. To ensure ongoing application security, the penetration tester should also continuously test the application. Unfortunately, such an approach is rarely financially feasible.
37
-
2. Due to a typically time boxed analysis, the penetration tester has to focus on trivial security issues (low-hangig fruits) and therefore will not address the serious, non-obvious ones.
43
+
2. Due to a typically time boxed analysis, the penetration tester has to focus on trivial security issues (low-hanging fruits) and therefore will not address the serious, non-obvious ones.
38
44
39
45
With the _secureCodeBox_ we provide a toolchain for continuous scanning of applications to find the low-hanging fruit issues early in the development process and free the resources of the penetration tester to concentrate on the major security issues.
0 commit comments