
DevSec Hardening FW
@DevSecIO
Followers
796
Following
25
Media
15
Statuses
143
RT @MicheeLengronne: As announced yesterday, every @DevSecIO @chef #Inspec profiles migrated from `attribute` to `input` dropping support….
0
2
0
RT @MicheeLengronne: Because @chef #Inspec changed 'attribute' for 'input', we modified @DevSecIO profiles accordingly. Tell us if it break….
0
2
0
RT @amulya_bhatia: Thanks to @DevSecIO, there is a one-stop shop for all your DevSecOps hardening needs + inspection using InSpec + remedia….
0
2
0
RT @eitherwayio: TIL about the "proc" file system on Linux. It gives you access to all process information. I have used the @DevSecIO Harde….
0
1
0
You were thinking what would make our @ansible server security roles even better? 🚀 We made it a lot easier to use them via ansible collections. Testing and quality are up! 🎉Thank you @zufallsheld and all contributors
0
3
3
Watch @MicheeLengronne talk about #devsecops! It covers vault, ansible and our devsec automation. 🇫🇷.
0
0
1
Great work 👍🏻 @zufallsheld @MicheeLengronne Having more automated releases makes our open source content even more reliable.
I participated in automating releases creation in the @DevSecIO .
0
0
2
RT @centriashamburg: Erlauben Eure AWS Security Groups den uneingeschränkten SSH Zugriff? Testen bitte! #inspec #aw….
0
2
0
RT @ehaselwanter: Teaching #DevOps best practices and supporting tools. @gitlab @kitchenci @DevSecIO @ansible @chef @puppetize @cincproject….
0
4
0
RT @snygg_johan: Made a containerized custom Allure reporter for the @DevSecIO Inspec CIS benchmarks, as well as a containerized benchmark….
0
1
0
🥳We had a great start into @haacktoberfest! Help us to fill the In-Progress column with your contribution 🏆. Let us make the world more secure place! Have a look at for open issues. #opensource #security for #devops #devsec #ansible #chef #puppet #inspec
0
1
5
RT @madplatt: @nickdothutton @chef @OpenPolicyAgent @ansible @thismarkp @DevSecIO has a bunch of templates already that can be used off the….
0
1
0
RT @___SKELETONS___: @chadloder @yaylinux InSpec and Chef are free for non-profit orgs and you can get some free scanning and remediation c….
0
1
0
We released many of our #DevSec baselines and a major update for our #Windows baseline. Special thanks to @LichtBlick_de and SVA System Vertrieb Alexander GmbH for their contributions to our Windows baseline.
0
3
11