Monday, May 11, 2026
No Result
View All Result
The Crypto HODL
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
Marketcap
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
No Result
View All Result
The Crypto HODL
No Result
View All Result

Deploying applications built in external CI through IBM Cloud DevSecOps

October 10, 2023
in Blockchain
Reading Time: 5 mins read
0 0
A A
0
Home Blockchain
Share on FacebookShare on Twitter


Cyber danger is preeminent in at the moment’s risk panorama, and that features assaults on the software program provide chain. Actually, the rise in cyberattacks on software program provide chains is estimated to have an effect on 45% of organizations worldwide. These are known as provide chain dangers, and so they embrace weak code that could be included from open supply or third events.

These assaults are much more detrimental in important techniques, which embrace IT infrastructure and monetary providers organizations. There’s additionally an excessive amount of pressure inside monetary markets between the necessities on innovation and agility for banking options versus the safety, compliance and regulatory necessities that CISOs (Chief Info Safety Officers) and CROs (Chief Danger Officers) want to ensure for his or her monetary establishments.

IBM Cloud for Monetary Companies

That is the place IBM Cloud for Monetary Companies shines—it helps purchasers to fill that hole by supporting innovation whereas guaranteeing safety and compliance. The aim of IBM Cloud for Monetary Companies is to supply safety and compliance for monetary providers corporations. It does so by leveraging business requirements like NIST and the experience of greater than 100 monetary providers purchasers who’re a part of the Monetary Companies Cloud Council.

IBM Cloud for Monetary Companies helps purchasers create safe and compliant hybrid cloud options with a concentrate on the entire software program lifecycle (together with steady integration (CI), steady supply, steady deployment and steady compliance) through the use of IBM Cloud DevSecOps (often known as One Pipeline).

Relying on how third-party code is obtained, it isn’t all the time doable to run a whole CI course of as a part of their construct. In that case, we have to apply various approaches, which might be described on this weblog.

What’s IBM Cloud DevSecOps and the way can it’s used to ensure safe and compliant purposes?

The DevSecOps pipelines, additionally known as One Pipeline, are used to deploy purposes on IBM Cloud—checking for vulnerabilities and guaranteeing auditability.

The continual integration (CI) pipeline is used to construct the appliance, which incorporates DevSecOps finest practices like unit testing, construct, dynamic scans, proof assortment, artifact signing and vulnerability checks.

The continual supply/deployment (CD) pipeline helps steady deployment of the appliance, together with proof assortment, GitOps-based stock circulate and promotion of property between environments, change administration and compliance scans.

The continual compliance (CC) pipeline periodically scans the deployed utility for steady compliance. It repeats lots of the scans from the CI pipeline, guaranteeing that new vulnerabilities are detected and flagged.

Learn extra in regards to the DevSecOps toolchains right here.

The default method for utilizing IBM Cloud DevSecOps

Usually, purposes are each constructed and deployed in IBM Cloud DevSecOps. The continual integration toolchains construct, take a look at and bundle the code, after which they replace two necessary repositories—the stock and the proof locker:

The stock tracks artifact deployments, signatures, and parts in a GitOps mannequin.

The proof locker accommodates gadgets asserting that varied required checks have been accomplished—unit exams, code scans, pull request opinions, and so forth.

These two repositories are created in CI and linked to the continual deployment/supply toolchain in order that deployment readiness checks may be accomplished. The stock determines what needs to be deployed, and the proof locker determines if the appliance is safe and strong sufficient to be deployed.

Completely different construct instruments

It isn’t all the time doable to have IBM Cloud DevSecOps construct purposes, notably from third events. This may be for quite a lot of causes—groups are extra acquainted with different construct instruments, the appliance might not be suited to the pipeline processes or groups could not need to dedicate time to a full transition to One Pipeline.

Almost about IBM Cloud for Monetary Companies, we nonetheless need purposes to be run by One Pipeline deployment in order that we are able to confirm that the appliance or part is safe and has gone by the required checks. However for this to be achieved, we require the stock and proof items to be in place.

DevSecOps CLI

Happily, the One Pipeline CI and CD toolchains have their pipeline code logic largely contained inside the DevSecOps (or cocoa) CLI. This consists of all the items required to construct the stock and proof lockers. So, within the occasion the One Pipeline CI can’t be used, the DevSecOps CLI may be built-in into present CI techniques, resembling Jenkins, Travis or Gitlab. The CLI is on the market from Artifactory as both an npm module or a standalone binary file.

Listed here are some pattern instructions used within the CLI:

cocoa verify pull-request-approval: Checks the approval state of a pull request for a given commit.

cocoa change-request check-approval: Checks the approval state of a change request (for deployment).

cocoa stock add: Provides an artifact to the stock repository.

cocoa stock promote: Promotes stock entries from one surroundings to a different.

cocoa incident add: Creates a problem for a failing process in a pipeline run.

cocoa locker proof add: Provides proof to the proof locker.

cocoa locker proof abstract: Returns proof abstract for a given asset.

The total CLI command reference may be discovered right here.

Case research: Monetary Transaction Supervisor (FTM)

Monetary Transaction Supervisor (FTM) is one such instance the place we couldn’t undertake a full One-Pipeline-based resolution. FTM is an already present monolithic utility, constructed utilizing Jenkins with a posh construct construction. Pipeline dependencies, construct orders and a protracted construct time make it a really imperfect candidate for One Pipeline steady integration.

Nevertheless, we nonetheless wished to have the ability to set up it on IBM Cloud for Monetary Companies utilizing One Pipeline. We labored with the FTM staff to combine the DevSecOps CLI of their present Jenkins-based pipelines.

That is an ongoing, gradual course of to make the FTM Jenkins pipelines work to generate the required stock and proof gadgets which can be utilized in a One Pipeline deployment pipeline.

For an instance of how the FTM staff approaches the issue, they first created utility courses of their Jenkins script libraries to make interplay with cocoa as straightforward as doable. These utilities make it straightforward to add a chunk of proof or stock merchandise to a Git repo, together with instrument sorts, outcomes, kind of proof, and so forth. An instance of proof assortment is beneath:

cocoaUtils.collectEvidence( imageName, “icr-va”, “success”, “com.ibm.cloud.image_vulnerability_scan”, “artifact”, “app-image”)

This permits the FTM staff so as to add proof wherever it’s deemed helpful, and it may be built-in into any a part of their Jenkins infrastructure. Right here is an instance of a list merchandise being added:

cocoaUtils.addInventory( imageName )

Conclusion

On this train, we confirmed how we are able to create a safe and compliant DevSecOps pipeline (particularly CD and CC toolchains) whereas protecting existent CI construct processes for an utility. By including particular open-source instruments and capabilities—just like the technology of an SBOM and proof locker—we’re in a position to increase existent pipelines and safe the software program provide chain, stopping and defending in opposition to software program provide chain danger.

Be taught extra about IBM Cloud for Monetary Companies

DevSecOps Architect, IBM Cloud for Monetary Companies

Distinguished Engineer, Monetary Companies Cloud



Source link

Tags: ApplicationsBuiltCloudDeployingDevSecOpsexternalIBM
Previous Post

Ethereum Foundation Under Attack, Selling 1,700 ETH Cost Them This Much

Next Post

Web3 community launches crypto humanitarian campaign for Israel

Related Posts

Hyperliquid, EdgeX, Pump.fun Return $96M to Token Holders
Blockchain

Hyperliquid, EdgeX, Pump.fun Return $96M to Token Holders

May 11, 2026
Top Bitcoin Mining Pools Back Stratum V2 Upgrade Effort
Blockchain

Top Bitcoin Mining Pools Back Stratum V2 Upgrade Effort

May 10, 2026
CLARITY Act Could Reshore Crypto Industry, Says Attorney
Blockchain

CLARITY Act Could Reshore Crypto Industry, Says Attorney

May 10, 2026
Jack Mallers: Wall Street Can’t Threaten Bitcoin’s Core Principles
Blockchain

Jack Mallers: Wall Street Can’t Threaten Bitcoin’s Core Principles

May 10, 2026
AAVE Price Prediction: Bulls Eye $105 Breakout as DeFi Momentum Builds
Blockchain

AAVE Price Prediction: Bulls Eye $105 Breakout as DeFi Momentum Builds

May 9, 2026
Zondacrypto (formerly BitBay) Faces Estonia FSA Warning
Blockchain

Zondacrypto (formerly BitBay) Faces Estonia FSA Warning

May 9, 2026
Next Post
Web3 community launches crypto humanitarian campaign for Israel

Web3 community launches crypto humanitarian campaign for Israel

The Rise, Fall, and Resurgence of Nifty Gateway: A Tale of Art, Technology, and Market Cycles | NFT CULTURE | NFT News | Web3 Culture

The Rise, Fall, and Resurgence of Nifty Gateway: A Tale of Art, Technology, and Market Cycles | NFT CULTURE | NFT News | Web3 Culture

Key Points From the Sam Bankman-Fried Trial’s First Week

Key Points From the Sam Bankman-Fried Trial's First Week

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Twitter Instagram LinkedIn Telegram RSS
The Crypto HODL

Find the latest Bitcoin, Ethereum, blockchain, crypto, Business, Fintech News, interviews, and price analysis at The Crypto HODL

CATEGORIES

  • Altcoin
  • Analysis
  • Bitcoin
  • Blockchain
  • Crypto Exchanges
  • Crypto Mining
  • Crypto Updates
  • DeFi
  • Ethereum
  • Metaverse
  • NFT
  • Regulations
  • Scam Alert
  • Uncategorized
  • Videos
  • Web3

SITE MAP

  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2023 The Crypto HODL.
The Crypto HODL is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
Crypto Marketcap

Copyright © 2023 The Crypto HODL.
The Crypto HODL is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In