What are the best practices for CI/CD tools performing privileged actions on a remote server?
When using CI/CD tools (such as jenkins or octopus deploy) how do companies follow best security practices when you need to perform privileged actions on a remote server as part of your build/deployment process?
For example if I want to ru… Continue reading What are the best practices for CI/CD tools performing privileged actions on a remote server?