{"id":127025,"date":"2023-04-06T10:00:00","date_gmt":"2023-04-06T17:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=127025"},"modified":"2024-07-03T08:00:45","modified_gmt":"2024-07-03T15:00:45","slug":"devops-threat-matrix","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/06\/devops-threat-matrix\/","title":{"rendered":"DevOps threat matrix"},"content":{"rendered":"\n

The use of DevOps practices, which enable organizations to deliver software more quickly and efficiently, has been on the rise. This agile approach minimizes the time-to-market of new features and bug fixes. More and more companies are implementing DevOps services, each with its own infrastructure and emphasis on distinctive features.<\/p>\n\n\n\n

As the use of these environments increases, so does attackers\u2019 interest. Several high-profile attacks that originated from a DevOps environment show the significant impact of these attacks if successful. Examples of such attacks from the past few years include the following:<\/p>\n\n\n\n