WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Joint Cybersecurity Information Sheet – Defending Continuous Integration/Continuous Delivery Environments
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Joint Cybersecurity Information Sheet – Defending Continuous Integration/Continuous Delivery Environments

Author: Alec Davison

Created: Thursday, June 29, 2023 - 18:42

Categories: Cybersecurity

Yesterday, CISA and the National Security Agency (NSA) published a joint Cybersecurity Information Sheet (CSI), Defending Continuous Integration/Continuous (CI/CD) Delivery Environment, to help organizations improve their defenses in cloud implementations of development, security, and operations. Specifically, the guide explains how to integrate security best practices into typical software development and operations CI/CD environments, without regard for the specific tools being adapted. 

The CI/CD environment is a development process for quickly building and testing code changes that helps organizations maintain a consistent code base for their applications while dynamically integrating code changes. Also, it is a key part of the development, security, and operations (DevSecOps) approach that integrates security and automation throughout the development lifecycle. Recognizing the various types of security threats that could affect CI/CD operations and taking steps to defend against each one is critical to securing a CI/CD environment. Network defenders can reference a list of common risks found in CI/CD pipelines and attack surfaces that could be exploited and threaten network security.     

The recommended actions for securing CI/CD pipeline include applying mitigations into the development process, development environment, and authentication and access phases, which are outlined in detail in this guide. The reporting agencies encourage organizations to read the joint CSI for a complete overview of the security risks, attack surface, as well as recommended mitigations to protect against this threat. Access the full guide at the NSA here.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar