Table of contents Overview Introduction How is this different? Security Engineers and Security Champions Principles Practices Organise Scaling Security Vulnerability Management Incident Response Training Compliance & Policy Intelligence Build Inception Stories & Epics Security in the Pipeline Periodic Review Operate Environment Provisioning Security of the Pipeline Security Testing in Production Detection & Response Contribute Contributors How to contribute