<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Dev Archives - Shell And Shield</title>
	<atom:link href="https://shell-and-shield.com/category/dev/feed/" rel="self" type="application/rss+xml" />
	<link>https://shell-and-shield.com/category/dev/</link>
	<description>Welcome to Shell &#38; Shield the DevSecOps channel that speaks command-line and security fluently.</description>
	<lastBuildDate>Thu, 03 Jul 2025 00:22:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://shell-and-shield.com/wp-content/uploads/2025/07/shellandshield-3-150x150.png</url>
	<title>Dev Archives - Shell And Shield</title>
	<link>https://shell-and-shield.com/category/dev/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What is a Software Supply Chain ?</title>
		<link>https://shell-and-shield.com/2025/07/03/what-is-a-software-supply-chain/</link>
		
		<dc:creator><![CDATA[Perceval]]></dc:creator>
		<pubDate>Wed, 02 Jul 2025 23:34:57 +0000</pubDate>
				<category><![CDATA[Dev]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<guid isPermaLink="false">https://shell-and-shield.com/?p=78</guid>

					<description><![CDATA[<p>Introduction You’ve heard of supply chains in manufacturing — but software has its own. In the world of modern development, a software supply chain includes everything that goes into building, testing, and delivering software. And like any supply chain, it can be attacked. Let’s break it down. 1. What is the Software Supply Chain? A [&#8230;]</p>
<p>The post <a href="https://shell-and-shield.com/2025/07/03/what-is-a-software-supply-chain/">What is a Software Supply Chain ?</a> appeared first on <a href="https://shell-and-shield.com">Shell And Shield</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><strong>Introduction</strong></h3>



<p>You’ve heard of supply chains in manufacturing — but software has its own. In the world of modern development, a <strong>software supply chain</strong> includes <strong>everything that goes into building, testing, and delivering software.</strong> And like any supply chain, it can be attacked.</p>



<p>Let’s break it down.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>1. What is the Software Supply Chain?</strong></h3>



<p>A <strong>software supply chain</strong> is the collection of <strong>code, tools, libraries, infrastructure, and processes</strong> used to build and deliver software.</p>



<p>It includes:</p>



<ul class="wp-block-list">
<li>Your source code</li>



<li>Open-source dependencies</li>



<li>Build systems (CI/CD)</li>



<li>Container images</li>



<li>Cloud infrastructure as code</li>



<li>Deployment scripts and tools</li>
</ul>



<p>Each component is a potential <strong>attack surface</strong>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>2. Why is it a target?</strong></h3>



<p>Attackers are shifting their focus <strong>upstream</strong> — compromising tools or libraries <strong>before</strong> software is deployed.</p>



<p>Examples:</p>



<ul class="wp-block-list">
<li>Injecting malicious code into open-source packages</li>



<li>Hijacking CI/CD pipelines</li>



<li>Tampering with container registries</li>
</ul>



<p><strong>NotPetya</strong>, <strong>SolarWinds</strong>, and <strong>Log4Shell</strong> are all examples of <strong>supply chain attacks</strong>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>3. What makes it vulnerable?</strong></h3>



<ul class="wp-block-list">
<li>Lack of visibility into 3rd-party dependencies</li>



<li>Overly permissive CI/CD access</li>



<li>Insecure secrets management</li>



<li>No signature or verification of builds and artifacts</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>4. How to secure your software supply chain</strong></h3>



<ul class="wp-block-list">
<li><strong>Inventory your dependencies</strong> (SBOM &#8211; Software Bill of Materials)</li>



<li><strong>Scan packages and images</strong> for vulnerabilities (e.g. Trivy, Snyk)</li>



<li><strong>Secure CI/CD pipelines</strong> with least privilege</li>



<li><strong>Sign and verify builds</strong> (e.g. Sigstore, Cosign)</li>



<li><strong>Use IaC scanning</strong> to detect misconfigurations</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>5. Key Tools for Supply Chain Security</strong></h3>



<ul class="wp-block-list">
<li><strong>Snyk, Trivy, Grype</strong> – dependency and image scanning</li>



<li><strong>Sigstore, Cosign</strong> – build signing</li>



<li><strong>Checkov, tfsec</strong> – IaC scanning</li>



<li><strong>GitHub Dependabot, Renovate</strong> – dependency updates</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>Conclusion</strong></h3>



<p>Your software is only as secure as the tools and components it’s built with. Protecting the software supply chain is no longer optional — it’s essential for secure development.<br>That’s <strong>the Software Supply Chain</strong>.</p>
<p>The post <a href="https://shell-and-shield.com/2025/07/03/what-is-a-software-supply-chain/">What is a Software Supply Chain ?</a> appeared first on <a href="https://shell-and-shield.com">Shell And Shield</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is Infrastructure as Code (IaC) ?</title>
		<link>https://shell-and-shield.com/2025/07/03/what-is-infrastructure-as-code-iac/</link>
		
		<dc:creator><![CDATA[Perceval]]></dc:creator>
		<pubDate>Wed, 02 Jul 2025 23:33:24 +0000</pubDate>
				<category><![CDATA[Dev]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<guid isPermaLink="false">https://shell-and-shield.com/?p=75</guid>

					<description><![CDATA[<p>Introduction Managing infrastructure manually is slow, error-prone, and doesn’t scale. That’s why modern teams use Infrastructure as Code (IaC) — a practice that lets you define and manage your infrastructure with code. Let’s see what that means. 1. What is IaC? Infrastructure as Code (IaC) is the process of provisioning and managing infrastructure through code, [&#8230;]</p>
<p>The post <a href="https://shell-and-shield.com/2025/07/03/what-is-infrastructure-as-code-iac/">What is Infrastructure as Code (IaC) ?</a> appeared first on <a href="https://shell-and-shield.com">Shell And Shield</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><strong>Introduction</strong></h3>



<p>Managing infrastructure manually is slow, error-prone, and doesn’t scale. That’s why modern teams use <strong>Infrastructure as Code (IaC)</strong> — a practice that lets you define and manage your infrastructure <strong>with code</strong>.</p>



<p>Let’s see what that means.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>1. What is IaC?</strong></h3>



<p><strong>Infrastructure as Code (IaC)</strong> is the process of <strong>provisioning and managing infrastructure through code</strong>, instead of using manual processes or GUIs.</p>



<p>With IaC, your servers, databases, networks, and cloud resources are <strong>defined in configuration files</strong> that can be version-controlled and automated.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>2. How does IaC work?</strong></h3>



<p>You write configuration files (usually in YAML, JSON, or HCL) that describe:</p>



<ul class="wp-block-list">
<li>What infrastructure you need</li>



<li>How it should be configured</li>



<li>How components should connect</li>
</ul>



<p>These files are then used by <strong>IaC tools</strong> to create and manage the actual infrastructure.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>3. Declarative vs Imperative</strong></h3>



<p>There are two main approaches:</p>



<ul class="wp-block-list">
<li><strong>Declarative</strong>: You declare the desired state. (e.g. Terraform, CloudFormation)</li>



<li><strong>Imperative</strong>: You define exact steps to achieve the state. (e.g. Ansible, Pulumi in imperative mode)</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>4. Benefits of IaC</strong></h3>



<ul class="wp-block-list">
<li><strong>Automation</strong>: Reduce manual setup</li>



<li><strong>Speed</strong>: Deploy infrastructure in minutes</li>



<li><strong>Consistency</strong>: Eliminate human errors</li>



<li><strong>Version control</strong>: Track changes like with code</li>



<li><strong>Scalability</strong>: Manage large infrastructures easily</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>5. IaC and DevSecOps</strong></h3>



<p>In a DevSecOps context, IaC also means:</p>



<ul class="wp-block-list">
<li>Scanning code for misconfigurations (e.g. open security groups, hardcoded secrets)</li>



<li>Enforcing security policies before deployment</li>
</ul>



<p>Tools like <strong>Checkov</strong>, <strong>tfsec</strong>, and <strong>OPA</strong> help secure IaC pipelines.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>Common IaC Tools</strong></h3>



<ul class="wp-block-list">
<li><strong>Terraform</strong> – cloud-agnostic, declarative</li>



<li><strong>AWS CloudFormation</strong> – AWS-native</li>



<li><strong>Pulumi</strong> – code-based, supports multiple languages</li>



<li><strong>Ansible</strong> – configuration management, imperative</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>Conclusion</strong></h3>



<p>Infrastructure as Code transforms infrastructure into repeatable, testable, and secure code. It’s a key part of automation and security in DevOps and DevSecOps.<br>That’s <strong>Infrastructure as Code (IaC)</strong>.</p>
<p>The post <a href="https://shell-and-shield.com/2025/07/03/what-is-infrastructure-as-code-iac/">What is Infrastructure as Code (IaC) ?</a> appeared first on <a href="https://shell-and-shield.com">Shell And Shield</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Does “Shift Left” Mean in Security?</title>
		<link>https://shell-and-shield.com/2025/07/03/what-does-shift-left-mean-in-security/</link>
		
		<dc:creator><![CDATA[Perceval]]></dc:creator>
		<pubDate>Wed, 02 Jul 2025 23:29:24 +0000</pubDate>
				<category><![CDATA[Dev]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://shell-and-shield.com/?p=69</guid>

					<description><![CDATA[<p>Introduction In DevSecOps and modern software development, you’ll often hear the phrase “shift left.” But what does it really mean? And why is it so important for building secure, high-quality software? Let’s dive in. 1. The Traditional Approach Traditionally, security and testing happened late in the development cycle — often just before deployment. This led [&#8230;]</p>
<p>The post <a href="https://shell-and-shield.com/2025/07/03/what-does-shift-left-mean-in-security/">What Does “Shift Left” Mean in Security?</a> appeared first on <a href="https://shell-and-shield.com">Shell And Shield</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><strong>Introduction</strong></h3>



<p>In DevSecOps and modern software development, you’ll often hear the phrase <strong>“shift left.”</strong> But what does it really mean? And why is it so important for building secure, high-quality software?</p>



<p>Let’s dive in.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>1. The Traditional Approach</strong></h3>



<p>Traditionally, security and testing happened <strong>late in the development cycle</strong> — often just before deployment. This led to:</p>



<ul class="wp-block-list">
<li>Late discovery of critical bugs</li>



<li>Expensive fixes</li>



<li>Delayed releases</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>2. What does “Shift Left” mean?</strong></h3>



<p>To <strong>shift left</strong> means to <strong>move key activities — like testing, security, and compliance — earlier</strong> in the development process.</p>



<p>Instead of securing the app at the end, we secure it <strong>as it&#8217;s being built</strong>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>3. Why Shift Left Matters</strong></h3>



<ul class="wp-block-list">
<li><strong>Early detection</strong> of bugs and vulnerabilities</li>



<li><strong>Lower cost</strong> to fix issues</li>



<li><strong>Faster feedback</strong> for developers</li>



<li><strong>Better collaboration</strong> between dev, security, and ops teams</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>4. Shift Left in DevSecOps</strong></h3>



<p>In DevSecOps, “shifting left” means:</p>



<ul class="wp-block-list">
<li>Running <strong>SAST</strong> (Static Application Security Testing) during code commits</li>



<li>Scanning <strong>IaC templates</strong> before infrastructure is deployed</li>



<li>Checking for <strong>vulnerable dependencies</strong> in real-time</li>
</ul>



<p>All of this happens <strong>before code reaches production</strong>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>5. Tools That Enable Shift Left</strong></h3>



<ul class="wp-block-list">
<li><strong>Snyk, SonarQube, Semgrep</strong> – for code scanning</li>



<li><strong>Checkov, tfsec</strong> – for IaC security</li>



<li><strong>GitHub Actions, GitLab CI</strong> – to automate everything</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>Conclusion</strong></h3>



<p>“Shift left” isn’t just a buzzword — it’s a mindset. By integrating testing and security early, teams reduce risk, save time, and build better software from the start.<br>That’s <strong>what “shift left” means</strong>.</p>
<p>The post <a href="https://shell-and-shield.com/2025/07/03/what-does-shift-left-mean-in-security/">What Does “Shift Left” Mean in Security?</a> appeared first on <a href="https://shell-and-shield.com">Shell And Shield</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is CI/CD?</title>
		<link>https://shell-and-shield.com/2025/07/03/what-is-ci-cd/</link>
		
		<dc:creator><![CDATA[Perceval]]></dc:creator>
		<pubDate>Wed, 02 Jul 2025 23:14:51 +0000</pubDate>
				<category><![CDATA[Dev]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<guid isPermaLink="false">https://shell-and-shield.com/?p=62</guid>

					<description><![CDATA[<p>Introduction Modern software development demands speed, agility, and reliability. That’s where CI/CD comes in — a fundamental practice that enables teams to deliver code faster and with fewer errors. 1. What does CI/CD stand for? Together, they form a pipeline that automates the process of building, testing, and releasing software. 2. Continuous Integration (CI) CI [&#8230;]</p>
<p>The post <a href="https://shell-and-shield.com/2025/07/03/what-is-ci-cd/">What is CI/CD?</a> appeared first on <a href="https://shell-and-shield.com">Shell And Shield</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><strong>Introduction</strong></h3>



<p>Modern software development demands speed, agility, and reliability. That’s where <strong>CI/CD</strong> comes in — a fundamental practice that enables teams to deliver code faster and with fewer errors.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>1. What does CI/CD stand for?</strong></h3>



<ul class="wp-block-list">
<li><strong>CI</strong> = <strong>Continuous Integration</strong></li>



<li><strong>CD</strong> = <strong>Continuous Delivery</strong> or <strong>Continuous Deployment</strong></li>
</ul>



<p>Together, they form a pipeline that automates the process of building, testing, and releasing software.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>2. Continuous Integration (CI)</strong></h3>



<p>CI is the practice of <strong>merging code changes frequently</strong> (often multiple times a day) into a shared repository. Every change triggers an <strong>automated build and test process</strong>.</p>



<p>Benefits of CI:</p>



<ul class="wp-block-list">
<li>Detect bugs early</li>



<li>Reduce integration issues</li>



<li>Maintain a stable codebase</li>
</ul>



<p>Tools for CI: GitHub Actions, GitLab CI, Jenkins, CircleCI</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>3. Continuous Delivery (CD)</strong></h3>



<p>CD ensures that code changes are <strong>automatically prepared for release</strong>. After passing the CI phase, the application can be deployed to <strong>staging or pre-production</strong> environments at any time.</p>



<p>Key focus: <strong>Automated testing and deployment readiness</strong></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>4. Continuous Deployment</strong></h3>



<p>Continuous Deployment goes one step further. Every change that passes all tests is <strong>automatically deployed to production</strong>, without manual intervention.</p>



<p>Difference:</p>



<ul class="wp-block-list">
<li><strong>Delivery</strong> = ready for release</li>



<li><strong>Deployment</strong> = automatically released</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>5. Benefits of CI/CD</strong></h3>



<ul class="wp-block-list">
<li>Faster release cycles</li>



<li>Reduced manual errors</li>



<li>Higher confidence in code quality</li>



<li>Enables DevOps and DevSecOps practices</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>6. CI/CD and Security</strong></h3>



<p>In a DevSecOps context, security checks (like SAST, DAST, dependency scanning) are integrated into the CI/CD pipeline. This ensures vulnerabilities are caught <strong>before</strong> reaching production.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>Conclusion</strong></h3>



<p>CI/CD is the backbone of modern DevOps and DevSecOps practices. It automates delivery, improves quality, and reduces risk — making software development faster and more reliable.<br>That’s <strong>CI/CD</strong>.</p>
<p>The post <a href="https://shell-and-shield.com/2025/07/03/what-is-ci-cd/">What is CI/CD?</a> appeared first on <a href="https://shell-and-shield.com">Shell And Shield</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
