• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
 by

Reviews

in
0.0
0 Reviews
Related markets: in Application Security Posture Management (ASPM) Tools (35 Reviews), in Software Composition Analysis (Transitioning to Software Supply Chain Security) (8 Reviews), in Code Review Tools (40 Reviews), in Application Security Testing (191 Reviews), in Developer Productivity Insight Platforms (53 Reviews), in Enterprise Agile Planning Tools (517 Reviews)
OverviewReviewsLikes and Dislikes
What Your Peers Are Saying About
Director of Information Security
Best Practices to create a SBOM with EOS/EOL Timeline to aid vulnerability remediation (currently use GitLab as our pipeline and Nexus repository).
Group Director of Information Security
It's a 5-step process which you will need to correlate for your environment. 1. Integrate dependency scanners (e.g., GitLab's built-in scanner, Trivy, Snyk, OWASP Dependency-Check or your existing Nexus repo) to flag outdated dependencies and use GitLab’s security dashboard to monitor deprecated packages. 2. Set up GitLab CI/CD rules to fail builds if EOL/EOS dependencies are detected and enforce allow/block lists for dependencies using GitLab’s security policies. 3. Configure GitLab to generate reports when a dependency is approaching its EOL and see if you can use GitLab’s webhook integrations to notify security teams via Slack, email, or Jira. 4. Implement dependency auto-updating tools (e.g., Renovate, Dependabot) to replace (identified & manually verified) EOL/EOS components. If no direct upgrade path exists, isolate the outdated component via containerization or sandboxing. 5. Maintain a historical record of all SBOMs and EOL/EOS alerts for compliance audits (ISO 27001, NIST, etc.). Regularly conduct security reviews using GitLab’s security reports.
See Full Discussion
22 Feb 2025428 Views1 Comment
IT Analyst
What has been your experience utilizing GITLAB (not GITHUB) to implement CI/CD for Athena and AWS GLUE, specifically for a process to transfer changes in Athena Views from the development environment to production?
CTO
We have used gitlab CI CD pipelines using terraform for all AWS resources, not athena or glue specifically though.
See Full Discussion
18 May 20231.1k Views1 Comment
Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply.
  • Community Guidelines
  • Listing Guidelines
  • Browse Vendors
  • Rules of Engagement
  • FAQ
  • Privacy
  • Terms of Service
©
 
©