Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Secure DevOps and Misconfigurations Survey Report
Secure DevOps and Misconfigurations Survey Report
Who it's for:
  • Cybersecurity Professionals
  • Secure Software Development Managers
  • Technical Directors

Secure DevOps and Misconfigurations Survey Report

Release Date: 11/18/2021

Working Group: DevSecOps

Secure DevOps, DevSecOps, and “shifting left” have become increasingly popular terms in cybersecurity. With the rapid increase both in volume and speed to delivery of applications, attacks on applications have also increased in both volume and complexity. Combine this with the shortage of cybersecurity professionals and lacking security skillsets, cybersecurity teams are already stretched to their limits. This has given rise to a DevSecOps approach, however, DevSecOps isn’t a silver bullet, organizations still face misconfigurations and other security challenges, struggle with implementing DevSecOps approach, and insufficient security skillsets

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
The State of Security Remediation 2024
The State of Security Remediation 2024
Data Loss Prevention and Data Security Survey Report
Data Loss Prevention and Data Security Survey R...
Neutralizing the Threat with Cloud Remediation
Neutralizing the Threat with Cloud Remediation
Published: 04/23/2024
Kernel Introspection from Linux to Windows
Kernel Introspection from Linux to Windows
Published: 04/18/2024
Protocols are Passé. APIs are Key for Effective Zero Trust Implementation.
Protocols are Passé. APIs are Key for Effective Zero Trust Implemen...
Published: 04/12/2024
How the Sys:All Loophole Allowed Us to Penetrate GKE Clusters in Production
How the Sys:All Loophole Allowed Us to Penetrate GKE Clusters in Pr...
Published: 04/05/2024

Acknowledgements

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

This person does not have a biography listed with CSA.

Frank Guanco
Frank Guanco
Research Program Manager, CSA

Frank Guanco

Research Program Manager, CSA

This person does not have a biography listed with CSA.

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

This person does not have a biography listed with CSA.

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

This person does not have a biography listed with CSA.

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training