|
|
@ -11,7 +11,7 @@ Structured languages that are used to configure databases, firewalls, servers, a |
|
|
|
* IT and cyber security security must work with development, risk and business people on a daily basis. |
|
|
|
* IT and cyber security security must work with development, risk and business people on a daily basis. |
|
|
|
* Changes are welcome because they allow them to respond to new threats, risks and vulnerabilities. |
|
|
|
* Changes are welcome because they allow them to respond to new threats, risks and vulnerabilities. |
|
|
|
* Security is a priority for delivering high-quality software and architecture as a code. |
|
|
|
* Security is a priority for delivering high-quality software and architecture as a code. |
|
|
|
* Security is functional requirements. |
|
|
|
* Security is functional requirement. |
|
|
|
* Teams must share knowledge in information and cyber security for growth |
|
|
|
* Teams must share knowledge in information and cyber security for growth |
|
|
|
* overall maturity of community resulting into guild. |
|
|
|
* overall maturity of community resulting into guild. |
|
|
|
* Automation and security coding is a long-term goal for architecture as a code. |
|
|
|
* Automation and security coding is a long-term goal for architecture as a code. |
|
|
|