<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Pro-Tek Blog &#187; secure Jenkins</title>
	<atom:link href="http://www.pro-tekconsulting.com/blog/category/secure-jenkins/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.pro-tekconsulting.com/blog</link>
	<description>For UI developers / UI designers and UI trends</description>
	<lastBuildDate>Thu, 05 Sep 2019 03:59:47 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.34</generator>
	<item>
		<title>HOW WILL YOU SECURE JENKINS?</title>
		<link>http://www.pro-tekconsulting.com/blog/how-will-you-secure-jenkins-2/</link>
		<comments>http://www.pro-tekconsulting.com/blog/how-will-you-secure-jenkins-2/#comments</comments>
		<pubDate>Wed, 06 Dec 2017 06:31:31 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[JENKINS]]></category>
		<category><![CDATA[secure Jenkins]]></category>

		<guid isPermaLink="false">http://www.pro-tekconsulting.com/blog/?p=2290</guid>
		<description><![CDATA[<p>How will you secure Jenkins? Ensure global security is on. Ensure that Jenkins is integrated with my company’s user directory with appropriate plugin. Ensure that matrix/Project matrix is enabled to fine tune access. Automate the process of setting rights/privileges in Jenkins with custom version controlled script. Limit physical access to Jenkins data/folders. Periodically run security [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.pro-tekconsulting.com/blog/how-will-you-secure-jenkins-2/">HOW WILL YOU SECURE JENKINS?</a> appeared first on <a rel="nofollow" href="http://www.pro-tekconsulting.com/blog">Pro-Tek Blog</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h4>How will you secure Jenkins?</h4>
<ul>
<li>Ensure global security is on.</li>
<li>Ensure that Jenkins is integrated with my company’s user directory with appropriate plugin.</li>
<li>Ensure that matrix/Project matrix is enabled to fine tune access.</li>
<li>Automate the process of setting rights/privileges in Jenkins with custom version controlled script.</li>
<li>Limit physical access to Jenkins data/folders.</li>
<li>Periodically run security audits on same.</li>
</ul>
<p>The post <a rel="nofollow" href="http://www.pro-tekconsulting.com/blog/how-will-you-secure-jenkins-2/">HOW WILL YOU SECURE JENKINS?</a> appeared first on <a rel="nofollow" href="http://www.pro-tekconsulting.com/blog">Pro-Tek Blog</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pro-tekconsulting.com/blog/how-will-you-secure-jenkins-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
