Part 1
Insufficient Flow Control Mechanisms
Part 2
Inadequate Identity & Access Management (IAM)
Part 3
Dependency Chain Abuse
Part 4
Poisoned Pipeline Execution (PPE)
Part 5
Insufficient Pipeline-Based Access Controls (PBAC)
Part 6
Insufficient Credential Hygiene
Part 7
Insecure System Configuration
Part 8
Ungoverned Usage of 3rd Party Services