{"id":9679,"date":"2019-11-13T06:21:00","date_gmt":"2019-11-13T13:21:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/protect-your-developers\/"},"modified":"2025-12-22T03:45:52","modified_gmt":"2025-12-22T10:45:52","slug":"%e9%96%8b%e7%99%ba%e8%80%85%e3%82%92%e4%bf%9d%e8%ad%b7%e3%81%99%e3%82%8b","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/","title":{"rendered":"InfoSec \u306e\u7686\u3055\u3093\u3001DevOps \u30c1\u30fc\u30e0\u3092\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306b\u4f55\u3092\u3057\u3066\u3044\u307e\u3059\u304b?"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Hey-InfoSec-protect-developers.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Close-up of computer screen displaying security logs and code, highlighting developer protection and InfoSec monitoring.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Hey-InfoSec-protect-developers.png 800w, https:\/\/swimlane.com\/wp-content\/uploads\/Hey-InfoSec-protect-developers-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Hey-InfoSec-protect-developers-768x477.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2019-11-13T06:21:00-07:00\">11\u6708 13, 2019<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Hey InfoSec, what are you doing to protect your DevOps Team?<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ja\/author\/Nick_Tausek\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Nick_Tausek.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tNick Tausek\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Hey%20InfoSec%2C%20what%20are%20you%20doing%20to%20protect%20your%20DevOps%20Team%3F').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fprotect-your-developers%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Hey%20InfoSec%2C%20what%20are%20you%20doing%20to%20protect%20your%20DevOps%20Team%3F&url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fprotect-your-developers%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fprotect-your-developers%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fprotect-your-developers%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2>&nbsp;<\/h2>\n<p>DevOps, serverless applications and containers are just a few of the latest advancements in a developer&#8217;s toolbox. For development teams, this means that the time to market (TTM) is faster\u2014especially for Agile teams. So, how and what are security operations teams doing to ensure that security is keeping pace with this rapid development? Most are attempting to incorporate a security engineer within their development teams\u2014which is a great first step\u2014but there are multiple layers that you need to ensure you are protecting your organization beyond your source-code.<\/p>\n<p>DevOps or DevSecOps is a great step forward, but the adoption (and implementation) of DevOps is still difficult for many organizations. Even if an organization has implemented DevSecOps, there are still major concerns that every security team needs to be aware of.<\/p>\n<p>No matter the size of the organization\u2014from a small tech startup to a global enterprise\u2014rapid deployment is key for maintaining a competitive advantage. Security must provide the necessary rights for your development to team to their jobs done. Developers and security teams alike need to be able to install any tools, libraries, etc. when they are needed.<\/p>\n<p>You have heard about <a href=\"https:\/\/www.theregister.co.uk\/2018\/11\/26\/npm_repo_bitcoin_stealer\/\" target=\"_blank\" rel=\"noopener\">NPM being compromised<\/a> right? What about <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/malware-found-in-arch-linux-aur-package-repository\/\" target=\"_blank\" rel=\"noopener\">Arch Linux<\/a>? <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/09\/devs-unknowingly-use-malicious-modules-put-into-official-python-repository\/\" target=\"_blank\" rel=\"noopener\">Python<\/a>? What security controls do you have in place to detect and prevent this for your own organization?<\/p>\n<h3>Monitor all the environments<\/h3>\n<p>Security teams have a bevy of concerns that need to be addressed daily from concerns of compromised upstream third-party packages to their production systems. But what about the deployment environments? QA environments? Are you monitoring them as well as you do production? You should be.<\/p>\n<p>In many situations (but not necessarily a best practice), a development or QA environment is a duplication of a known good environment (like production). This means that this environment <em>may have <\/em><strong>production <\/strong>data that your security teams should be aware of. These development environments should have the same or similar security controls as they do with their production environments and should be monitored (and logged) as you would with any production system.<\/p>\n<p>There are many other controls you can add, but the point is that you need to make sure that your team is accurately monitoring these environments and has visibility into any changes made to any environment.<\/p>\n<p>If your development or QA environments are stuffed full of non-production data, then there are still risks you need to be aware of.<\/p>\n<h3>Keys, tokens, CI\/CD, oh my!<\/h3>\n<p>Do your developers have access to your CI\/CD (continuous integration and continuous deliver) build and deploy environments? Do they have access to development environments either locally or in AWS\/Azure\/GCP\/etc.?<\/p>\n<p>If you answered yes, then you must ensure that you are monitoring your developers activity (especially on their local system) closely! All it takes is visiting a bad site or a succumbing to a phishing email, and you could be in serious danger.<\/p>\n<p>If your developers access cloud based resources, they typically use a set of credentials or access\/secret keys to access these environments. Guess where they are stored? Yep, their local system. Here\u2019s a quick list of places to look:<\/p>\n<pre>AWS CLI:\n ls ~\/.aws\n ~\/.aws\/credentials\n ~\/.aws\/config\nAzure CLI:\n $HOME\/.azure (*nix &amp; macOS)\n %USERPROFILE%\\.azure (Windows)\n<\/pre>\n<p>If these credentials on your developer\u2019s machines are compromised, it could be devastating for your organization. A malicious actor can modify your CI\/CD environments and alter your code base without ever being detected in compiled binaries or libraries.<\/p>\n<p>Additionally, you should prevent developers from accidentally committing secrets to repositories. There are several ways to detect this, but one way is to use <a href=\"https:\/\/github.com\/awslabs\/git-secrets\" target=\"_blank\" rel=\"noopener\">git-secrets<\/a> from AWS.<\/p>\n<p>Make sure that your security team understands where secrets are kept, how they are used, and what the consequences are for not monitoring or alerting on potential misuse of these credentials.<\/p>\n<h3>Containerization<\/h3>\n<p>As organizations move to containers, serverless and infrastructure as code, information security teams should be working with development teams to establish an internal container repository that is continually monitored by the security team. If a new package or library is needed, then make sure that a security engineer (on your development team) reviews the code before merging into your master branch. Additionally, you should start implementing automated scanning of your repositories to help identify any potential secrets left in commits and to help identify any vulnerable third-party libraries being imported or used in your product.<\/p>\n<h3>Development team + security<\/h3>\n<p>Imagine you are on a development team, and someone from some other department came in and told you that your work sucks and there are security holes left and right. How would you react? Well, probably not too great, especially if you feel that your code is pretty good!<\/p>\n<p>This type of interaction with development teams happens all the time, and we need to approach this problem differently. This is why we need to embed security engineers with our development teams. This engineer should be able to identify security issues, create backlog items (tickets), and be able to work (code) those backlog items. This key individual is both a developer and a security specialist within the development team.<\/p>\n<p>Now, imagine receiving feedback from your co-team member. The reaction by the rest of the development team would be more understanding, and they would have a direct line of communication\u2014including building a long-term relationship between developers and security. As they become comfortable, the remaining developers on the team don\u2019t want to add more work for their teammate. So, do you think they will take their time or stop and think about their implementation? I do.<\/p>\n<p>Additionally, this security engineer should be brought into discussions with the product manager\/owner and architect at the early stages, as they are the de facto security personnel and should be part of initial design decisions that may impact how your product handles security (think authentication, shared secrets, communications, etc.)<\/p>\n<h3>Wrap up<\/h3>\n<p>All security professionals are busy. There too many alerts and not enough hours in the day. Even if we cannot respond to every alert, security operations center (SOC) team members need to understand what the mission of their organization is, where critical assets are, and what to look for in this ever evolving threat landscape. By working with development teams, we can help protect our respective organizations and begin to ingrain security in our development life cycle.<\/p>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d378eb103b3 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/national-read-across-america-day\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>3\u6708 2, 2020<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>One team two team red team blue team<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d378eb11c75 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/swimlane-named-most-innovative-security-investigation-platform-in-2021-cdm-global-infosec-awards\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>5\u6708 18, 2021<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Swimlane Named Most Innovative Security Investigation Platform in 2021 CDM Global Infosec Awards<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d378eb12d5b bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/black-hat-keynote-2019\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>8\u6708 1, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Every security team is a software team now: Why you should attend the Black Hat keynote<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":22,"featured_media":9680,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9679","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What are you doing to protect your DevOps Team?<\/title>\n<meta name=\"description\" content=\"No matter the size of the organization\u2014from a small tech startup to a global enterprise\u2014rapid deployment is key.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u958b\u767a\u8005\u3092\u4fdd\u8b77\u3059\u308b\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hey InfoSec, what are you doing to protect your DevOps Team?\" \/>\n<meta property=\"og:description\" content=\"No matter the size of the organization\u2014from a small tech startup to a global enterprise\u2014rapid deployment is key.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u958b\u767a\u8005\u3092\u4fdd\u8b77\u3059\u308b\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-22T10:45:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Hey-InfoSec-protect-developers.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"497\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/\",\"url\":\"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/\",\"name\":\"What are you doing to protect your DevOps Team?\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Hey-InfoSec-protect-developers.png\",\"datePublished\":\"2019-11-13T13:21:00+00:00\",\"dateModified\":\"2025-12-22T10:45:52+00:00\",\"description\":\"No matter the size of the organization\u2014from a small tech startup to a global enterprise\u2014rapid deployment is key.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Hey-InfoSec-protect-developers.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Hey-InfoSec-protect-developers.png\",\"width\":800,\"height\":497,\"caption\":\"Close-up of computer screen displaying security logs and code, highlighting developer protection and InfoSec monitoring.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hey InfoSec, what are you doing to protect your DevOps Team?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ja\/#website\",\"url\":\"https:\/\/swimlane.com\/ja\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ja\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ja\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ja\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DevOps \u30c1\u30fc\u30e0\u3092\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306b\u4f55\u3092\u3057\u3066\u3044\u307e\u3059\u304b?","description":"\u7d44\u7e54\u306e\u898f\u6a21\u306b\u95a2\u4fc2\u306a\u304f\u3001\u5c0f\u898f\u6a21\u306a\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u7cfb\u30b9\u30bf\u30fc\u30c8\u30a2\u30c3\u30d7\u304b\u3089\u30b0\u30ed\u30fc\u30d0\u30eb\u4f01\u696d\u307e\u3067\u3001\u8fc5\u901f\u306a\u5c0e\u5165\u304c\u9375\u3068\u306a\u308a\u307e\u3059\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u958b\u767a\u8005\u3092\u4fdd\u8b77\u3059\u308b\/","og_locale":"ja_JP","og_type":"article","og_title":"Hey InfoSec, what are you doing to protect your DevOps Team?","og_description":"No matter the size of the organization\u2014from a small tech startup to a global enterprise\u2014rapid deployment is key.","og_url":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u958b\u767a\u8005\u3092\u4fdd\u8b77\u3059\u308b\/","og_site_name":"AI Security Automation","article_modified_time":"2025-12-22T10:45:52+00:00","og_image":[{"width":800,"height":497,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Hey-InfoSec-protect-developers.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"5\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/","url":"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/","name":"DevOps \u30c1\u30fc\u30e0\u3092\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306b\u4f55\u3092\u3057\u3066\u3044\u307e\u3059\u304b?","isPartOf":{"@id":"https:\/\/swimlane.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Hey-InfoSec-protect-developers.png","datePublished":"2019-11-13T13:21:00+00:00","dateModified":"2025-12-22T10:45:52+00:00","description":"\u7d44\u7e54\u306e\u898f\u6a21\u306b\u95a2\u4fc2\u306a\u304f\u3001\u5c0f\u898f\u6a21\u306a\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u7cfb\u30b9\u30bf\u30fc\u30c8\u30a2\u30c3\u30d7\u304b\u3089\u30b0\u30ed\u30fc\u30d0\u30eb\u4f01\u696d\u307e\u3067\u3001\u8fc5\u901f\u306a\u5c0e\u5165\u304c\u9375\u3068\u306a\u308a\u307e\u3059\u3002.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Hey-InfoSec-protect-developers.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Hey-InfoSec-protect-developers.png","width":800,"height":497,"caption":"Close-up of computer screen displaying security logs and code, highlighting developer protection and InfoSec monitoring."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ja\/blog\/protect-your-developers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Hey InfoSec, what are you doing to protect your DevOps Team?"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ja\/#website","url":"https:\/\/swimlane.com\/ja\/","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","description":"\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u578bAI\u3067\u81ea\u52d5\u5316","publisher":{"@id":"https:\/\/swimlane.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ja\/#organization","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","url":"https:\/\/swimlane.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/9679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/users\/22"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/9679\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media\/9680"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media?parent=9679"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/tags?post=9679"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-type?post=9679"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=9679"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=9679"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/blog-category?post=9679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}