ChaptersEventsBlog
Share how your organization is preparing for the agentic shift in identity governance. Take the Securing AI Agents Survey by October 10 →

Download Publication

MLOps Overview
MLOps Overview
Who it's for:
  • Data Scientists
  • Machine Learning Engineers
  • Security Engineers
  • DevSecOps Practitioners
  • IT Operations Teams
  • CISOs
  • Solution Architects

MLOps Overview

Release Date: 08/27/2025

Updated On: 09/17/2025

Machine learning (ML) is becoming increasingly central to business operations, making the security of ML pipelines essential rather than optional. Machine Learning Operations (MLOps) is a set of repeatable processes to build, deploy, and continuously monitor machine learning models, focusing on three main areas: data, software, and the model itself. Unlike traditional software development, MLOps incorporates operations to machine learning, allowing for development and testing in a reliable, incremental, and repeatable way.

This comprehensive overview explores how DevSecOps practices apply to the ML lifecycle through MLOps, along with Large Language Model Operations (LLMOps), and AI Agent Operations (AgentOps). It reveals that traditional security approaches are insufficient for ML systems due to novel threats such as data poisoning, model inversion, adversarial attacks, and member inference attacks.

This foundational document also sets the stage for a more in-depth MLSecOps research series, which will provide practical guidance on threat modeling ML solutions, implementing DevSecOps practices in MLOps environments, and creating security reference architectures.

Key Takeaways:
  • How MLOps encompasses traditional ML, LLMOps, and AgentOps under one unified framework
  • The unique security threats that ML systems face and the specialized protection they require
  • How stakeholders must collaborate across the four key MLOps stages: design, development, operations, and continuous feedback
  • The need for MLSecOps frameworks
Download this Resource

Bookmark
Share
Related resources
Analyzing Log Data with AI Models to Meet Zero Trust Principles
Analyzing Log Data with AI Models to Meet Zero ...
Agentic AI Identity and Access Management: A New Approach
Agentic AI Identity and Access Management: A Ne...
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
"Set It and Forget It” Access Control is No Longer Enough
"Set It and Forget It” Access Control is No Longer Enough
Published: 08/20/2025
Securing the Agentic AI Control Plane: Announcing the MCP Security Resource Center
Securing the Agentic AI Control Plane: Announcing the MCP Security ...
Published: 08/20/2025
Agentic AI and Zero Trust
Agentic AI and Zero Trust
Published: 08/07/2025
From Aware to Actionable: Closing the Cloud Security Resilience Gap
From Aware to Actionable: Closing the Cloud Security Resilience Gap
Published: 08/07/2025

Acknowledgements

Usman Mustafa
Usman Mustafa
Director of Strategic Accounts, Orange Business

Usman Mustafa

Director of Strategic Accounts, Orange Business

CISSP | CCIE | GDSA | AI & Cybersecurity Advisor | Director, Strategic Accounts at Orange Business 

Read more

Deepak Antiya
Deepak Antiya
Principal, Oracle

Deepak Antiya

Principal, Oracle

Srihari Pakalapati
Srihari Pakalapati
Principal Cloud & Security Architect, Trader Interactive

Srihari Pakalapati

Principal Cloud & Security Architect, Trader Interactive

Dharnisha Narasappa
Dharnisha Narasappa
Sr Network Architect-Cybersecurity, Versa Networks

Dharnisha Narasappa

Sr Network Architect-Cybersecurity, Versa Networks

Abdul Sattar
Abdul Sattar

Abdul Sattar

Roupe Sahans
Roupe Sahans
DevSecOps Leader

Roupe Sahans

DevSecOps Leader

Roupe leads DevSecOps delivery and thought leadership for technology and media clients embracing digital transformation.

Roupe started his DevOps journey in 2016, building containerised microservices on AWS for government platforms. He has since been working with engineers to c-suite executives to embed security and resilience into digital products, secure cloud services, and reduce cyber technical-debt.

Most recently Roupe ha...

Read more

Akhil Mittal
Akhil Mittal

Akhil Mittal

Akhil is a distinguished technologist and cyber security expert with over 18 years of global experience. He excels in driving strategic and tactical guidance, providing leadership in cybersecurity initiatives. Throughout his career, Akhil has collaborated closely with CISOs and executive leadership to design and implement security frameworks and software security solutions tailored to meet diverse business objectives. His expertise spans a ...

Read more

Rahul Kalva
Rahul Kalva

Rahul Kalva

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training