ChaptersEventsBlog
Register now for the December 11 session on the rise of DeepSeek, AI experimentation, and critical security gaps.

Download Publication

Secure DevOps and Misconfigurations Survey Report
Secure DevOps and Misconfigurations Survey Report
Who it's for:
  • Cybersecurity Professionals
  • Secure Software Development Managers
  • Technical Directors

Secure DevOps and Misconfigurations Survey Report

Release Date: 11/18/2021

Working Group: DevSecOps

Secure DevOps, DevSecOps, and “shifting left” have become increasingly popular terms in cybersecurity. With the rapid increase both in volume and speed to delivery of applications, attacks on applications have also increased in both volume and complexity. Combine this with the shortage of cybersecurity professionals and lacking security skillsets, cybersecurity teams are already stretched to their limits. This has given rise to a DevSecOps approach, however, DevSecOps isn’t a silver bullet, organizations still face misconfigurations and other security challenges, struggle with implementing DevSecOps approach, and insufficient security skillsets

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Beyond the Hype: A Benchmark Study of AI Agents in the SOC
Beyond the Hype: A Benchmark Study of AI Agents...
State of SaaS Security Report 2025
State of SaaS Security Report 2025
The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action
The Six Pillars of DevSecOps: Measure, Monitor,...
Why Compliance as Code is the Future (And How to Get Started)
Why Compliance as Code is the Future (And How to Get Started)
Published: 12/04/2025
Navigating the Liminal Edge of AI Security: Deconstructing Prompt Injection, Model Poisoning, and Adversarial Perturbations in the Cognitive Cyber Domain
Navigating the Liminal Edge of AI Security: Deconstructing Prompt I...
Published: 12/01/2025
MCP Can Be RCE for You and Me
MCP Can Be RCE for You and Me
Published: 11/25/2025
It’s Time to Make Cloud Threat Modeling Continuous
It’s Time to Make Cloud Threat Modeling Continuous
Published: 11/20/2025

Interested in helping develop research with CSA?

Related Certificates & Training