What is DevSecOps?

Always learning
3 min readDec 15, 2024

--

DevSecOps is just a term. It’s not a person or a specific role. However, it’s a team working together to build pipelines for people to use. There are many roles involved which play a role in developing DevSecOps.

The reporting structure depends on which role you play and on which team. As it stands you have developers, security, and operations.

You could be hired for the security team to own a tool and its integration into the pipeline, or you could be hired on the developer side to create pipelines for people to use.

DevSecOps is like a combination of application security and cloud security.

To implement DevSecOps, software teams must first implement DevOps and continuous integration.

DevSecOps, on the other hand, makes security testing a part of the application development process itself. Security teams and developers collaborate to protect the users from software vulnerabilities.

Successful implementation of the DevSecOps practice consists of the following components:

  1. Key Management
  2. Collobaration and Comunication
  3. Threat Modeling
  4. Vulnerability management
  5. Security checks and Scans
  6. Container Security
  7. Continuous Monitoring
  8. IaC
  9. CI/CD
  10. QA Integration

Key Managementinvolves separating keys from data for increased flexibility and security. You can have multiple keys for the same data, the same key for multiple files, key backup and recovery, and many more choices.

✅ API Key Management

✅ Password Management

✅ Certificate Management

CyberSecurity Collobaration refers to sharing information, resources, and expertise among various entities to address cyber threats collectively.

CyberSecurity Communicationsrefers to the strategies, methods, and tools used to convey information about the security and protection of digital assets, networks, and systems.

✅ Knowledge-based culture in the organization

✅ Continuous Improvement in becoming risk-averse

Threat Modelingrefers involves identifying and communicating information about the threats that may impact a particular system or network.

✅ Potential threats
✅ Modeling
✅ Identify vulnerabilities
✅ Regular risk assessment

Vulnerability Management (VM) is a continuous, cyclical process of identifying and eliminating vulnerabilities in the organization’s infrastructure.

✅ Vulnerability scan
✅ Prioritize vulnerabilities
✅ Continuous fixes

Security Scanningis like a digital checkup for computer systems and software.

Security Checks include information gathering, scanning, and penetration testing to identify weaknesses in security controls and potential vulnerabilities.

✅ SAST (Static Application Security Testing)
✅ DAST (Dynamic Application Security Testing)

Container Security is the practice of securing containerized applications and infrastructure against security risks. The goal of container security is to detect, assess, and remediate misconfigurations, software vulnerabilities.

✅ Image and runtime
✅ Security
✅ Image scan

Continuous Monitoring is a relatively new buzzword in cybersecurity. It’s a practice where we create a system to continuously observe security threats and alert the relevant team to address the issue.

✅ User activity monitoring
✅ System Logs Monitoring
✅ Network traffic monitoring

Infrastructure as Code (IaC) is a process that automates the provisioning and management of cloud resources. IaC software takes some input scripts describing the desired state and then communicates with the cloud vendors.

✅ Infrastructure as a Code
✅ Configuration management

CI/CD security is the implementation of security measures in the CI/CD pipeline to ensure secure development, testing, and deployment of applications.

✅ Automated build, testing and deployment
✅ Security check integration

QA must be integrated seamlessly into the security process to ensure that security measures are updated and effective.

✅ Embed QA in the dev lifecycle

Thank you 🙏 for taking the time to read our blog.

--

--

Always learning
Always learning

Written by Always learning

கற்றுக் கொள்ளும் மாணவன்...

No responses yet