Appendix
Microsoft Defender for DevOps
BY GEORGE WILBURN, PRINCIPAL PM DEFENDER FOR DEVOPS
Attackers know there is a treasure trove of information in source code. This has turned source code management systems into an increasingly high-value attack target. Regardless of whether attackers leverage the source code for initial access or as an exfiltration point, or use it to harvest valuable data such as credentials, the source code and systems that house it must now be on the frontline of the defense. Adversaries can find ways to attack running systems by exfiltrating and examining source code. While the source code itself is valuable—think ransomware scenarios and corporate infiltration points—if adversaries can command and control the source ...
Get Microsoft Defender for Cloud now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.