Guides on Secure Pipelines are structured, in-depth resources designed to explain how to design, secure, and operate CI/CD and software delivery pipelines.
Unlike individual articles, guides focus on core concepts, architectures, and long-term practices that remain relevant across tools and platforms.
Secure CI/CD architecture
These guides explore how CI/CD pipelines are designed, where trust boundaries exist, and how security controls can be integrated without breaking delivery workflows.
- CI/CD execution models and trust assumptions
- Pipeline stages and security responsibilities
- Secure runner architectures and isolation strategies
- Separation of duties and least privilege in pipelines
Software supply chain security
Software supply chain security focuses on protecting the integrity of what is built, how it is built, and how it is delivered.
- Dependency risks and transitive trust
- Build integrity and reproducible builds
- Artifact provenance and attestations
- SLSA levels and practical implementation
Build integrity and artifact trust
These guides cover techniques and patterns for ensuring that build outputs are authentic, traceable, and protected against tampering.
- Artifact signing and verification
- Using Sigstore and Cosign
- Attestation formats and metadata
- Verifying artifacts at deployment time
Secrets management in pipelines
Secrets are one of the most common sources of CI/CD compromise.
These guides focus on managing secrets safely across pipeline stages and environments.
- Secrets exposure risks in CI/CD
- Secrets injection patterns
- Short-lived credentials and identity-based access
- Integrating external secret managers
Policy enforcement and controls
Security controls in pipelines must be enforceable, auditable, and predictable.
- Policy as Code concepts
- Using OPA for pipeline controls
- Validating configurations and workflows
- Failing pipelines safely and explicitly
Threats, attacks, and defenses
Understanding how CI/CD pipelines are attacked is essential to securing them.
- Common CI/CD attack paths
- Compromised runners and build agents
- Dependency confusion and artifact poisoning
- Defensive patterns and mitigations
Using the guides
Guides are designed to be read sequentially or used as reference material.
Each guide:
- Explains the underlying concepts
- Shows practical design and implementation options
- Discusses trade-offs and limitations
- Links to relevant labs and articles
As new threats, tools, and practices emerge, guides are updated to remain accurate and useful over time.
Related ecosystem
For compliance, governance, and regulatory guidance related to CI/CD and DevSecOps, see regulated-devsecops.com.
Together, the two sites provide both the engineering and governance perspectives required to secure modern software delivery pipelines.