{"id":92,"date":"2026-01-16T16:00:53","date_gmt":"2026-01-16T15:00:53","guid":{"rendered":"https:\/\/secure-pipelines.com\/?page_id=92"},"modified":"2026-03-25T07:04:31","modified_gmt":"2026-03-25T06:04:31","slug":"topics","status":"publish","type":"page","link":"https:\/\/secure-pipelines.com\/es\/topics\/","title":{"rendered":"Temas"},"content":{"rendered":"<p>Esta p\u00e1gina ofrece una visi\u00f3n general de los principales temas t\u00e9cnicos cubiertos en Secure Pipelines.<\/p>\n<p>Cada tema representa un \u00e1rea central de la seguridad de CI\/CD y de la cadena de suministro de software, con art\u00edculos en profundidad, gu\u00edas y laboratorios pr\u00e1cticos.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">CI\/CD Security<\/h2>\n<p>Este tema se centra en proteger los pipelines de CI\/CD contra manipulaci\u00f3n, abuso y cambios no autorizados.<\/p>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/complete-guide-ci-cd-pipeline-security\/\">\u2192 Leer la gu\u00eda completa de CI\/CD Pipeline Security<\/a><\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/ci-cd-execution-models-trust-assumptions-security-guide\/\">Modelos de ejecuci\u00f3n de pipelines y l\u00edmites de confianza<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/separation-of-duties-least-privilege-ci-cd-pipelines\/\">Permisos, identidades y control de acceso<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/secrets-management-ci-cd-pipelines-patterns-vault\/\">Exposici\u00f3n y protecci\u00f3n de secrets<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/secure-deployment-workflows-ci-cd-pipeline-production\/\">Flujos de trabajo de deployment seguros<\/a><\/li>\n<\/ul>\n<p><em>Gu\u00edas:<\/em> <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/policy-as-code-ci-cd-opa-rego-security-gates\/\">Policy as Code<\/a> | <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/short-lived-credentials-workload-identity-federation-ci-cd-2\/\">Workload Identity Federation<\/a> | <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/defensive-patterns-mitigations-ci-cd-pipeline-attacks\/\">Patrones defensivos<\/a><br \/><em>Hojas de referencia:<\/em> <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/owasp-top-10-ci-cd-risks-explained-real-world-examples\/\">OWASP Top 10 CI\/CD Risks<\/a> | <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/slsa-levels-explained-practical-compliance-checklist\/\">SLSA Levels Checklist<\/a><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">Software Supply Chain Security<\/h2>\n<p>La seguridad de la cadena de suministro de software aborda la integridad de las dependencias, los builds y los artefactos.<\/p>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/es\/software-supply-chain\/software-supply-chain-security-comprehensive-guide\/\">\u2192 Leer la gu\u00eda completa de Software Supply Chain Security<\/a><\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/dependency-confusion-artifact-poisoning-attacks-defenses\/\">Riesgos de dependencias y confianza transitiva<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/build-integrity-reproducible-builds-ci-cd\/\">Integridad de builds y builds reproducibles<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/artifact-provenance-attestations-slsa-in-toto\/\">Provenance y attestations de artefactos<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/signing-verifying-container-images-sigstore-cosign\/\">Firma y verificaci\u00f3n de artefactos<\/a><\/li>\n<\/ul>\n<p><em>Labs:<\/em> <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-signing-verifying-container-images-cosign-github-actions\/\">Cosign Signing<\/a> | <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-generating-verifying-slsa-provenance-container-images-2\/\">SLSA Provenance<\/a> | <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-sbom-pipeline-generate-attest-verify-syft-cosign-2\/\">SBOM Pipeline<\/a> | <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-reproducible-container-builds-pinning-verifying-diffing-2\/\">Reproducible Builds<\/a><br \/><em>Comparativas:<\/em> <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/container-image-signing-tools-compared-cosign-notation-gpg\/\">Herramientas de firma<\/a> | <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/sbom-tools-compared-syft-trivy-cyclonedx-cli\/\">Herramientas SBOM<\/a><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">Pipeline Hardening<\/h2>\n<p>Este tema cubre t\u00e9cnicas para fortalecer los entornos de ejecuci\u00f3n de pipelines.<\/p>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/es\/pipeline-hardening\/pipeline-hardening-secure-ci-cd-build-deployment-environments-2\/\">\u2192 Leer la gu\u00eda de Pipeline Hardening<\/a><\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-ephemeral-self-hosted-runners-actions-runner-controller-2\/\">Aislamiento de runners y agentes de build<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/network-filesystem-restrictions-ci-cd-build-environments\/\">Restricciones de red y sistema de archivos<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/separation-of-duties-least-privilege-ci-cd-pipelines\/\">Modelos de ejecuci\u00f3n con privilegio m\u00ednimo<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/securing-github-actions-runners-2\/\">Hardening de runners compartidos y self-hosted<\/a><\/li>\n<\/ul>\n<p><em>Labs:<\/em> <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-hardening-github-actions-workflows-permissions-pinning-secrets\/\">GHA Hardening<\/a> | <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-detecting-preventing-secret-leaks-ci-cd-pipelines-3\/\">Secret Leaks<\/a> | <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-enforcing-kubernetes-policies-opa-conftest-ci-cd-2\/\">OPA Conftest<\/a><br \/><em>Comparativas:<\/em> <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/ci-cd-security-scanners-compared-trivy-grype-snyk-checkov-2\/\">Security Scanners<\/a> | <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/ci-cd-policy-engines-compared-opa-kyverno-sentinel-cedar\/\">Policy Engines<\/a><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">GitHub Actions<\/h2>\n<p>Este tema se centra en proteger los workflows construidos con GitHub Actions.<\/p>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/github-actions-security-definitive-guide\/\">\u2192 Leer la gu\u00eda definitiva de seguridad de GitHub Actions<\/a><\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/github-actions-security-cheat-sheet\/\">Permisos de workflows y alcance de tokens<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-detecting-malicious-github-actions-static-analysis-2\/\">Protecci\u00f3n de actions de terceros<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-ephemeral-self-hosted-runners-actions-runner-controller-2\/\">Seguridad y aislamiento de runners<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-configuring-oidc-workload-identity-github-actions-aws-2\/\">OIDC workload identity con AWS<\/a><\/li>\n<\/ul>\n<p><em>Labs:<\/em> <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-hardening-github-actions-workflows-permissions-pinning-secrets\/\">Hardening Workflows<\/a> | <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-signing-verifying-container-images-cosign-github-actions\/\">Cosign Signing<\/a> | <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-generating-verifying-slsa-provenance-container-images-2\/\">SLSA Provenance<\/a><br \/><em>Hoja de referencia:<\/em> <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/github-actions-security-cheat-sheet\/\">GitHub Actions Security Cheat Sheet<\/a><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">GitLab CI<\/h2>\n<p>Este tema explora las consideraciones de seguridad espec\u00edficas de GitLab CI\/CD.<\/p>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/gitlab-ci-cd-security-definitive-guide\/\">\u2192 Leer la gu\u00eda definitiva de seguridad de GitLab CI\/CD<\/a><\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-securing-gitlab-ci-pipelines-protected-variables-runners-environments-2\/\">Seguridad de pipelines y jobs<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/gitlab-ci-security-cheat-sheet\/\">Configuraci\u00f3n y aislamiento de runners<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/secrets-management-ci-cd-pipelines-patterns-vault\/\">Gesti\u00f3n de secrets en pipelines de GitLab<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/secure-deployment-workflows-ci-cd-pipeline-production\/\">Flujos de trabajo de deployment seguros<\/a><\/li>\n<\/ul>\n<p><em>Lab:<\/em> <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-securing-gitlab-ci-pipelines-protected-variables-runners-environments-2\/\">Proteger pipelines de GitLab CI<\/a><br \/><em>Hoja de referencia:<\/em> <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/gitlab-ci-security-cheat-sheet\/\">GitLab CI Security Cheat Sheet<\/a><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">Threats and Attacks<\/h2>\n<p>Comprender c\u00f3mo se atacan los pipelines de CI\/CD es fundamental para defenderlos.<\/p>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/ci-cd-threats-attacks-what-attackers-target-how-to-defend-2\/\">\u2192 Leer la gu\u00eda de amenazas y ataques a CI\/CD<\/a><\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/threats-attacks\/ci-cd-pipelines-primary-attack-surface\/\">Rutas de ataque comunes en CI\/CD<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/dependency-confusion-artifact-poisoning-attacks-defenses\/\">T\u00e9cnicas de ataque a la cadena de suministro<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-exploiting-defending-poisoned-pipeline-execution-ppe\/\">Poisoned pipeline execution<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/owasp-top-10-ci-cd-risks-explained-real-world-examples\/\">OWASP Top 10 CI\/CD Risks<\/a><\/li>\n<\/ul>\n<p><em>Labs:<\/em> <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-exploiting-defending-poisoned-pipeline-execution-ppe\/\">Ataque PPE<\/a> | <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-simulating-dependency-confusion-attack-sandbox-2\/\">Dependency Confusion<\/a> | <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-detecting-malicious-github-actions-static-analysis-2\/\">Malicious Actions<\/a> | <a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-artifact-tampering-detection-swapping-container-images-registry-2\/\">Artifact Tampering<\/a><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">Policy as Code<\/h2>\n<p>Policy as Code permite controles de seguridad automatizados y aplicables en los pipelines de CI\/CD.<\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/policy-as-code-ci-cd-opa-rego-security-gates\/\">Principios de dise\u00f1o de pol\u00edticas y OPA\/Rego<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/lab-enforcing-kubernetes-policies-opa-conftest-ci-cd-2\/\">Validaci\u00f3n de configuraci\u00f3n y workflows con Conftest<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/es\/ci-cd-security\/ci-cd-policy-engines-compared-opa-kyverno-sentinel-cedar\/\">Comparativa de policy engines: OPA vs Kyverno vs Sentinel vs Cedar<\/a><\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">C\u00f3mo utilizar los temas<\/h2>\n<p>Los temas pueden explorarse de forma independiente o utilizarse como puntos de entrada hacia contenido m\u00e1s estructurado.<\/p>\n<p>Cada tema enlaza a:<\/p>\n<ul class=\"wp-block-list\">\n<li>Art\u00edculos relacionados y gu\u00edas principales<\/li>\n<li>Gu\u00edas t\u00e9cnicas en profundidad<\/li>\n<li>Laboratorios pr\u00e1cticos<\/li>\n<li>Hojas de referencia y recursos comparativos<\/li>\n<\/ul>\n<p>En conjunto, ofrecen una visi\u00f3n completa de la seguridad de CI\/CD y de la cadena de suministro de software.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">Ecosistema relacionado<\/h2>\n<p>Para perspectivas de cumplimiento, gobernanza y regulaci\u00f3n relacionadas con DevSecOps y CI\/CD, consulte <strong><a href=\"https:\/\/regulated-devsecops.com\" target=\"_blank\" rel=\"noopener\">regulated-devsecops.com<\/a><\/strong>.<\/p>\n<p>Secure Pipelines se centra en la implementaci\u00f3n t\u00e9cnica, mientras que Regulated DevSecOps se centra en la gobernanza y la auditabilidad.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Esta p\u00e1gina ofrece una visi\u00f3n general de los principales temas t\u00e9cnicos cubiertos en Secure Pipelines. Cada tema representa un \u00e1rea central de la seguridad de CI\/CD y de la cadena de suministro de software, con art\u00edculos en profundidad, gu\u00edas y laboratorios pr\u00e1cticos. CI\/CD Security Este tema se centra en proteger los pipelines de CI\/CD contra &#8230; <a title=\"Temas\" class=\"read-more\" href=\"https:\/\/secure-pipelines.com\/es\/topics\/\" aria-label=\"Leer m\u00e1s sobre Temas\">Leer m\u00e1s<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-92","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/secure-pipelines.com\/es\/wp-json\/wp\/v2\/pages\/92","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secure-pipelines.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/secure-pipelines.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/secure-pipelines.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secure-pipelines.com\/es\/wp-json\/wp\/v2\/comments?post=92"}],"version-history":[{"count":1,"href":"https:\/\/secure-pipelines.com\/es\/wp-json\/wp\/v2\/pages\/92\/revisions"}],"predecessor-version":[{"id":721,"href":"https:\/\/secure-pipelines.com\/es\/wp-json\/wp\/v2\/pages\/92\/revisions\/721"}],"wp:attachment":[{"href":"https:\/\/secure-pipelines.com\/es\/wp-json\/wp\/v2\/media?parent=92"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}