GitHub Actions Security Cheat Sheet: Permissions, Pinning, Secrets, and OIDC

1. Permissions — Principle of Least Privilege The single highest-impact change you can make to any GitHub Actions workflow is locking down permissions. By default, GITHUB_TOKEN has read and write access to most scopes. Override that immediately. Default Read-Only Permissions (Top-Level) Place this at the top of every workflow file to make read-only the default … Read more

CI/CD Threats and Attacks: What Attackers Target and How to Defend

Modern software delivery relies on Continuous Integration and Continuous Delivery (CI/CD) pipelines to build, test, and deploy code at scale. These pipelines have become the backbone of DevOps, enabling organizations to ship features faster and more reliably than ever before. But this power comes with a critical trade-off: CI/CD systems have become one of the … Read more

GitLab CI/CD Security: The Definitive Guide

GitLab CI/CD has become the backbone of modern DevSecOps, offering an integrated platform where code, pipelines, security scanning, and deployments converge in a single interface. But that deep integration is a double-edged sword: a misconfigured pipeline can expose secrets, allow unauthorized deployments, or give attackers a foothold in your infrastructure. This definitive guide covers every … Read more

The Complete Guide to CI/CD Pipeline Security

Introduction CI/CD pipelines are the backbone of modern software delivery. They automate the journey from code commit to production deployment, enabling teams to ship faster, more reliably, and with greater confidence. But this power comes with a critical tradeoff: pipelines are increasingly the primary target for sophisticated attackers. Think about what a CI/CD pipeline touches. … Read more

Lab: Reproducible Container Builds — Pinning, Verifying, and Diffing Images

Overview If you build the same Dockerfile twice and get different images, you cannot verify build integrity. A non-reproducible build means you have no way to confirm that the artifact running in production was actually produced from the source code you audited. Attackers can exploit this ambiguity to inject malicious code during the build process … Read more

How to Secure GitHub Actions in Enterprise Environments

To secure GitHub Actions in an enterprise environment, you must adopt a layered defence strategy that spans identity management, infrastructure hardening, and strict workflow governance. Security in CI/CD pipelines is critical because pipelines often have high-level privileges and access to production environments, making them a prime target for attackers. In enterprise environments, CI/CD pipelines are … Read more

Lab: Artifact Tampering and Detection — Swapping Container Images in a Registry

Overview Container image tags are mutable pointers. Unlike a Git commit hash, the tag v1.0.0 is not cryptographically bound to a specific image — it is simply a label that a registry maps to a manifest digest. Anyone with push access to a repository can overwrite that mapping at any time, silently replacing the image … Read more

Lab: Implementing a Secure Build Pipeline with Tekton and Tekton Chains

Overview Tekton is a powerful, Kubernetes-native open-source framework for creating continuous integration and continuous delivery (CI/CD) systems. It runs as a set of Custom Resource Definitions (CRDs) on any Kubernetes cluster, letting you define pipelines as declarative YAML that are portable across environments. Tekton Chains is a companion project that adds automatic supply chain security … Read more

CI/CD Policy Engines Compared: OPA vs Kyverno vs Sentinel vs Cedar

Introduction: Why Policy Engines Matter for CI/CD Modern CI/CD pipelines move fast. Teams push dozens — sometimes hundreds — of deployments per day, and every one of those deployments carries configuration decisions that affect security, compliance, and operational stability. A single misconfigured Kubernetes manifest, an overly permissive IAM role in Terraform, or a container image … Read more