ChaptersEventsBlog
Join Zero Trust founder John Kindervag as he reveals adoption insights in a September 16 webinar. Register now!

Download Publication

MLOps Overview
MLOps Overview
Who it's for:
  • Data Scientists
  • Machine Learning Engineers
  • Security Engineers
  • DevSecOps Practitioners
  • IT Operations Teams
  • CISOs
  • Solution Architects

MLOps Overview

Release Date: 08/27/2025

Machine learning (ML) is becoming increasingly central to business operations, making the security of ML pipelines essential rather than optional. Machine Learning Operations (MLOps) is a set of repeatable processes to build, deploy, and continuously monitor machine learning models, focusing on three main areas: data, software, and the model itself. Unlike traditional software development, MLOps incorporates operations to machine learning, allowing for development and testing in a reliable, incremental, and repeatable way.

This comprehensive overview explores how DevSecOps practices apply to the ML lifecycle through MLOps, along with Large Language Model Operations (LLMOps), and AI Agent Operations (AgentOps). It reveals that traditional security approaches are insufficient for ML systems due to novel threats such as data poisoning, model inversion, adversarial attacks, and member inference attacks.

This foundational document also sets the stage for a more in-depth MLSecOps research series, which will provide practical guidance on threat modeling ML solutions, implementing DevSecOps practices in MLOps environments, and creating security reference architectures.

Key Takeaways:
  • How MLOps encompasses traditional ML, LLMOps, and AgentOps under one unified framework
  • The unique security threats that ML systems face and the specialized protection they require
  • How stakeholders must collaborate across the four key MLOps stages: design, development, operations, and continuous feedback
  • The need for MLSecOps frameworks
Download this Resource

Prefer to access this resource without an account?
Download the publication. Download the presentation.

Bookmark
Share
Related resources
Agentic AI Identity and Access Management: A New Approach
Agentic AI Identity and Access Management: A Ne...
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Secure Agentic System Design: A Trait-Based Approach
Secure Agentic System Design: A Trait-Based App...
"Set It and Forget It” Access Control is No Longer Enough
"Set It and Forget It” Access Control is No Longer Enough
Published: 08/20/2025
Securing the Agentic AI Control Plane: Announcing the MCP Security Resource Center
Securing the Agentic AI Control Plane: Announcing the MCP Security ...
Published: 08/20/2025
Agentic AI and Zero Trust
Agentic AI and Zero Trust
Published: 08/07/2025
From Aware to Actionable: Closing the Cloud Security Resilience Gap
From Aware to Actionable: Closing the Cloud Security Resilience Gap
Published: 08/07/2025

Acknowledgements

Usman Mustafa
Usman Mustafa
Director of Strategic Accounts, Orange Business

Usman Mustafa

Director of Strategic Accounts, Orange Business

CISSP | CCIE | GDSA | AI & Cybersecurity Advisor | Director, Strategic Accounts at Orange Business 

Read more

Deepak Antiya
Deepak Antiya
Principal, Oracle

Deepak Antiya

Principal, Oracle

Abdul Sattar Headshot Missing
Abdul Sattar

Abdul Sattar

Roupe Sahans
Roupe Sahans
DevSecOps Leader

Roupe Sahans

DevSecOps Leader

Roupe leads DevSecOps delivery and thought leadership for technology and media clients embracing digital transformation.

Roupe started his DevOps journey in 2016, building containerised microservices on AWS for government platforms. He has since been working with engineers to c-suite executives to embed security and resilience into digital products, secure cloud services, and reduce cyber technical-debt.

Most recently Roupe ha...

Read more

Akhil Mittal
Akhil Mittal

Akhil Mittal

Akhil is a distinguished technologist and cyber security expert with over 18 years of global experience. He excels in driving strategic and tactical guidance, providing leadership in cybersecurity initiatives. Throughout his career, Akhil has collaborated closely with CISOs and executive leadership to design and implement security frameworks and software security solutions tailored to meet diverse business objectives. His expertise spans a ...

Read more

Rahul Kalva
Rahul Kalva

Rahul Kalva

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training