Sonatype

×
Sign In

Lesson Category: 100

Summary – Lesson 3

You have completed Lesson 3.  You are now able to: Define policies in Nexus IQ. Create a policy hierarchy. Articulate how policy inheritance operates in Nexus IQ.

Summary – Lesson 4

You have completed Lesson 3.  You are now able to: Articulate the definition of a policy Evaluate an application Decide when remediation is required

Summary – Lesson 3

You have completed Lesson 3.  You are now able to:  Identify the players in Nexus IQ process Describe where you fit in to the Nexus IQ process List all of the people that are responsible for security

Summary – Lesson 2

Describe how Nexus IQ improves communication. Select better components for your builds. Define how Nexus IQ enables continuous development.  Describe how Nexus IQ enables the mitigation of security research.

Summary – Lesson 1

You have completed Lesson 1.  You are now able to: Identify the ways in which Nexus IQ enables you to release faster Describe the current problem with the state of the software supply chain Identify ways that using Nexus IQ can strengthen your software supply chain

Who Is Responsible for Security

Everyone is responsible for security—not just the security team.  These include: Policy Creators Integration Participants Developer Participants. Each of these categories identify where certain roles in the software development lifecycle (SDLC) fall into the Nexus IQ process, along with their responsibilities. Policy Creators Policy creators are the subject matter experts in your organization who create and …

Who Is Responsible for Security Read More »

Where Do I Fit In?

The following section is a typical example of the software development lifecycle process and the various stakeholders involved. When you build your application, you pull OSS components from Nexus Repository.  Nexus Repository downloads components from places like Maven Central or other 3rd party repositories. Developers use those components, do some integration work, write their own …

Where Do I Fit In? Read More »

Course Summary

Congratulations!You have completed this course.  You are now able to: Identify risks and vulnerabilities in using open source software and ways to mitigate those risks. Articulate the benefits of using Nexus IQ. Describe where the developer fits into the Nexus IQ policy process. Define what a policy is. Recognize when remediation is required. Resources Need more …

Course Summary Read More »

Working With Nexus IQ Policies

Objectives By the end of this lesson, you will be able to: Articulate the definition of a policy Evaluate an application Decide when remediation is required What is a Policy in Nexus IQ Review this video to learn about policies in Nexus IQ. Now that you know more about IQ Server, and how it is used …

Working With Nexus IQ Policies Read More »