ChaptersEventsBlog
Register now for NHIcon 2026, a half-day online event, to learn what the future of AI security requires.

Download Publication

Information Security Management through Reflexive Security
Information Security Management through Reflexive Security

Information Security Management through Reflexive Security

Release Date: 08/01/2019

Working Group: DevSecOps

DevOps, the practice of applying developmental best practices such as collective collaboration to infrastructure operations, has been shown to positively impact efficiencies of development and operations teams today, especially in the cloud environment. Given its strengthening adoption, it is necessary to consider its impact on information security itself and look to apply those practices to the arena of information security management.

This document defines “Reflexive Security” as a new security management approach that is built upon the interrelationships between security, development and operations necessary for protecting the security stance and the deliverables of an organization.

Download this Resource

Bookmark
Share
Related resources
The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action
The Six Pillars of DevSecOps: Measure, Monitor,...
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
The Six Pillars of DevSecOps - Pragmatic Implementation
The Six Pillars of DevSecOps - Pragmatic Implem...
Why Your Copilot Needs a Security Co-Pilot: Enhancing GenAI with Deterministic Fixes
Why Your Copilot Needs a Security Co-Pilot: Enhancing GenAI with De...
Published: 12/10/2025
Security for AI Building, Not Security for AI Buildings
Security for AI Building, Not Security for AI Buildings
Published: 12/09/2025
Why Compliance as Code is the Future (And How to Get Started)
Why Compliance as Code is the Future (And How to Get Started)
Published: 12/04/2025
Navigating the Liminal Edge of AI Security: Deconstructing Prompt Injection, Model Poisoning, and Adversarial Perturbations in the Cognitive Cyber Domain
Navigating the Liminal Edge of AI Security: Deconstructing Prompt I...
Published: 12/01/2025

Interested in helping develop research with CSA?

Related Certificates & Training