The first step is to create a feedback loop between SecOps and DevOps teams. This will help both sides understand each others needs better so they can work together more effectively. The next step is for SecOps to gain visibility into the API transactions taking place across their network without slowing down development or introducing any additional security vulnerabilities in the process. Finally, once this visibility has been established, it must be used to automatically apply security policies across all of the enterprises APIs while still allowing DevOps teams the flexibility they need to meet changing business requirements quickly and efficiently
https://t.co/Vg3WT9OA74