Secure Pipelines

Engineering Security for CI/CD & Software Supply Chains

Secure Pipelines is a technical knowledge hub dedicated to securing CI/CD, GitOps, and software delivery pipelines. Practical security engineering, real-world implementations, and hands-on labs — from code to production.

Built by practitioners, for practitioners.


Start here

New to CI/CD security? Start with these comprehensive guides:


Platform guides

Platform Definitive Guide Cheat Sheet Hands-On Lab
GitHub Actions Security Guide Cheat Sheet Hardening Lab
GitLab CI Security Guide Cheat Sheet Securing Lab
Tekton Tekton Chains Lab

Featured guides

→ Browse all guides


Hands-on labs

Step-by-step exercises with real CI/CD configurations, YAML examples, and failure scenarios.

Attack & defense

Supply chain & signing

Platform hardening

→ Browse all 15 labs


Tool comparisons

Choosing the right tools? These in-depth comparisons help you decide.


Quick references

→ Browse all resources and tools


Explore by topic

Topic What it covers Start here
CI/CD Security Trust boundaries, permissions, secrets, deployment controls Complete Guide
Supply Chain Dependencies, builds, signing, provenance, SBOMs Comprehensive Guide
GitHub Actions Workflows, permissions, runners, OIDC, third-party actions Definitive Guide
GitLab CI Variables, runners, environments, tokens, deployments Definitive Guide
Threats & Attacks PPE, dependency confusion, credential theft, artifact tampering Threats Guide
Pipeline Hardening Runner isolation, network restrictions, least privilege Hardening Guide

→ Browse all topics


Who is this site for

Secure Pipelines is designed for engineering teams operating real-world pipelines:

  • DevOps engineers — hardening the pipelines you build and maintain
  • Platform engineers — designing secure CI/CD infrastructure at scale
  • Security engineers — assessing and improving pipeline security posture
  • DevSecOps practitioners — integrating security into delivery workflows
  • Technical architects — designing trust models and control architectures

No vendor hype. No shallow checklists. Just practical, engineering-focused security.


The ecosystem

Secure Pipelines is part of a two-site ecosystem:

  • Secure Pipelines — Technical implementation: how to build, harden, and defend CI/CD pipelines.
  • Regulated DevSecOps — Governance and compliance: how to govern, audit, and certify those controls (ISO 27001, NIS2, SOC 2).

Together, they provide both the engineering and governance perspectives required to secure modern software delivery.


CI/CD security must be engineered, not bolted on.