Secure Delivery Playbook
Equal ExpertsContact UsPlaybooks
  • Overview
  • Introduction
    • How is this different?
    • Security Engineers and Security Champions
  • Principles
  • Practices
    • Organise
      • Scaling Security
      • Vulnerability Management
      • Incident Response
      • Training
      • Compliance & Policy
      • Intelligence
    • Build
      • Inception
      • Stories & Epics
      • Security in the Pipeline
      • Periodic Review
    • Operate
      • Environment Provisioning
      • Security of the Pipeline
      • Security Testing in Production
      • Detection & Response
  • Contribute
    • Contributors
    • How to contribute
Powered by GitBook
On this page
Export as PDF

Contribute

PreviousDetection & ResponseNextContributors

Last updated 5 years ago

This playbook is produced through the efforts of , all of whom have generously shared their experience for the benefit of others.

Guides like this are never complete. There will always be improvements we can make and as more teams use these practices in a wider variety of contexts - some of which we may not have envisioned. To help ensure this playbook remains relevant and useful, we welcome contributions from anyone in the wider software engineering community. Please see the if you're interested in helping out.

a number of people
contribution guidelines