Cloudsmith Blog

Latest

Apr 24 2025
6 min read

OWASP CI/CD Top 10: Inadequate IAM

In the race to ship software faster, many teams have turned to automation, decentralised tools, and powerful pipelines. But lurking under the surface of these streamlined processes is a growing and often invisible Identity and Access Management (IAM) threat vector. — a core vulnerability in modern CI/CD security. This post is Part 2 in our ongoing blog series exploring the OWASP Top 10 CI/CD Security Risks, based on insights from Cloudsmith’s free OWASP eBook, which is a must-read for anyone se
Picture of Nigel Douglas
Nigel Douglas

Featured Blogs

Showing 1 to 12 of 277 results
Get our next blog straight to your inbox