Cloud 101CircleEventsBlog
Discover the latest cloud threats, evolving AI risks, and how to stay ahead. Don’t miss CSA’s free Cloud Threats & Vulnerabilities Summitregister now!

Download Publication

Secure DevOps and Misconfigurations Survey Report
Secure DevOps and Misconfigurations Survey Report
Who it's for:
  • Cybersecurity Professionals
  • Secure Software Development Managers
  • Technical Directors

Secure DevOps and Misconfigurations Survey Report

Release Date: 11/18/2021

Working Group: DevSecOps

Secure DevOps, DevSecOps, and “shifting left” have become increasingly popular terms in cybersecurity. With the rapid increase both in volume and speed to delivery of applications, attacks on applications have also increased in both volume and complexity. Combine this with the shortage of cybersecurity professionals and lacking security skillsets, cybersecurity teams are already stretched to their limits. This has given rise to a DevSecOps approach, however, DevSecOps isn’t a silver bullet, organizations still face misconfigurations and other security challenges, struggle with implementing DevSecOps approach, and insufficient security skillsets

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action
The Six Pillars of DevSecOps: Measure, Monitor,...
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
The State of Security Remediation 2024
The State of Security Remediation 2024
SaaS Security and IaaS Security—Why You Need Both
SaaS Security and IaaS Security—Why You Need Both
Published: 03/27/2025
The Shift to Risk-Based Data Security Posture Management
The Shift to Risk-Based Data Security Posture Management
Published: 03/03/2025
Why Should Active Directory Hygiene Be Part of Your NHI Security Program?
Why Should Active Directory Hygiene Be Part of Your NHI Security Pr...
Published: 02/25/2025
Implementing CCM: The Change Management Process
Implementing CCM: The Change Management Process
Published: 02/24/2025

Acknowledgements

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Frank Guanco
Frank Guanco
Operations Director, CSA

Frank Guanco

Operations Director, CSA

Sean Heide
Sean Heide

Sean Heide

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training