PS Product SecurityKnowledge Base

๐Ÿ”— Reference Links

This archive was expanded using public vendor documentation, standards guidance, project documentation, and CloudSecDocs summary pages. Favor primary documentation and current vendor references when you need exact syntax or current platform behavior.

Standards and project references

Identity, federation, and platform access

Browser and frontend references

Architecture, microservices, and logging

Existing archive reference families carried forward

  • GitLab hardening recommendations, CI/CD components, protected environments, deployment approvals, runner security, release evidence, and GitLab secret detection
  • GitHub secret scanning and push protection
  • DefectDojo docs and supported parser references
  • AWS Security Hub, GuardDuty, IAM, Access Analyzer, CloudTrail, ECS/EKS, and IMDS docs
  • Azure Activity Log, Entra sign-in logs, managed identities, AKS, and Key Vault docs
  • GCP Security Command Center, Cloud Audit Logs, Cloud IAM, and GKE docs
  • Checkov, Open Policy Agent, Gatekeeper, Kyverno, Conftest, and HashiCorp Sentinel docs
  • HashiCorp Vault docs and operator guidance
  • Falco, Tetragon, and KubeArmor project documentation

v2.2 focused references

  • MDN secure cookie configuration
  • OWASP Session Management Cheat Sheet
  • OWASP Cross Site Scripting Prevention Cheat Sheet
  • OWASP Top 10 for Business Logic Abuse
  • OWASP API Security Top 10 2023
  • GitHub Actions security hardening
  • GitLab CI/CD components documentation
  • Next.js Content Security Policy guide

Senior-engineer and leadership references

v2.4 leadership framing references

Newcomer-friendly frameworks and references

  • OWASP Application Security Verification Standard (ASVS)
  • OWASP API Security Top 10
  • Kubernetes Security Checklist
  • NIST Secure Software Development Framework (SSDF)

Deliberately vulnerable learning environments

v2.7 hands-on lab references

Security maturity model references

v2.9 book-informed strengthening references

  • Jim Bird, DevOpsSec (2016) โ€” secure delivery through Continuous Delivery, shift-left, self-service security, and compliance-as-code framing
  • Adrian Mouat, Docker Security (2015/2016) โ€” defense in depth, least privilege, image provenance, content trust, and host segregation
  • NSA/CISA Kubernetes Hardening Guidance (March 2022, v1.1) โ€” Pod security, control-plane protection, network separation, RBAC, audit logging, and upgrade discipline
  • NIST SP 800-190 Application Container Security Guide
  • CIS Docker Benchmark
  • CIS Kubernetes Benchmark

Legacy-to-current tool translation references

  • Prisma Cloud / Prisma Cloud Compute (Twistlock lineage)
  • Docker Content Trust retirement guidance and migration considerations
  • Sigstore Cosign quickstart and verification docs
  • Falco documentation, Helm installation, and falcoctl
  • ScoutSuite project docs and releases
  • Prowler documentation
  • OWASP Dependency-Check documentation
  • Dependency-Track documentation
  • Syft and Grype documentation
  • Contrast Assess / IAST documentation
  • Fastly Next-Gen WAF documentation (Signal Sciences lineage)

Editorial rule used in this archive

Where older books or courses name tools that have been retired, renamed, or displaced, this archive keeps the older name for historical understanding and adds the current practical equivalent next to it. That lets readers understand legacy screenshots and older CI examples without copying outdated patterns blindly.