Defense in Depth cover image

Managing Data Leaks Outside Your Perimeter

Defense in Depth

CHAPTER

Safeguarding Credentials and Secrets in Software Development

The chapter emphasizes the risks of leaking sensitive information like credentials and stresses the importance of proactive measures such as scanning code repositories for leaks. It discusses secure secret management, challenges in securing secrets, providing a good developer experience with security tools, and the concept of shifting security responsibilities to developers.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner