Devops Resources

Software

The Twelve-Factor App

Kubernetes

Kubernetes The Hard Way

Security

Attack Techniques
Attacking and Securing CI/CD Pipelines
Common Threat Matrix for CI/CD Pipeline
Software Supply Chain Security Guidelines
Slowloris - A neat, simple and effective attack
Example of CSRF