Skip to content
View SecureLayer's full-sized avatar
🎯
🎯

Block or report SecureLayer

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
SecureLayer/README.md

Hey there 👋

🌱 I’m currently learning AI and Blockchain-related topics

💬 Ask me about Incident Response, SecTools, DFIR, Best Practices

📫 Reach me at [email protected] to hire me!

🛠️ My favorite software and tool

Bitwarden Yubico Cloudflare SIFT Workstation Elba Security Snyk GitGuardian OWASP Linear Jupyter Tines Nightfall Git Wireshark Postman Visual Studio Code SublimeText Obsidian Github MongoDB Bootstrap Hugo Anaconda Docker SQLite Bash ZSH Python iTerm2 Terraform Google Cloud Google Apps Script Google Sheets LaTeX Markdown Canva Figma Signal Proton Substack Brave Arc Tor Brackets OrbStack OneFlow

Pinned Loading

  1. API-Security API-Security Public

    Forked from OWASP/API-Security

    OWASP API Security Project

    Dockerfile 2

  2. Template_Secured_Terraform_multi-clo... Template_Secured_Terraform_multi-cloud_setup.md
    1
    # How to use this Template
    2
    
                  
    3
    - Install Terraform: Ensure you have Terraform installed locally.
    4
    - Configure providers: Authenticate with AWS, Azure and GCP using your credentials.
    5
    - Set variables: Define the necessary variables in a .tfvars file.
  3. CI/CD Security with github actions CI/CD Security with github actions
    1
    ## My **best practices** to harden GitHub Actions workflows and protect sensitive assets used during automated builds and deployments.
    2
    
                  
    3
    ---
    4
    
                  
    5
    ## **1. Use minimal permissions for workflows**
  4. Secrets Scanning Checklist Secrets Scanning Checklist
    1
    ### Scans Both Application Code and Infrastructure as Code Files
    2
    	Recommended secrets scanning solution criteria: 
    3
    	• Scans for secrets in both IaC and application code 
    4
    	• Augments secrets scanning with the context of an IaC file around the secret
    5
      
  5. awesome-french-devsecops awesome-french-devsecops Public

    Une liste de liens permettant de se former aux outils utilisés dans le domaine du DevSecOps

  6. awesome-french-secops awesome-french-secops Public

    Liste de liens permettant de se former aux outils utilisés dans le domaine du SecOps