Cloud 101CircleEventsBlog
Don't miss out! Join us for the free, virtual Global AI Symposium from October 22nd - 24th—register today!

Download Publication

The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration and Integration
Who it's for:
  • CISO/CIO/COO
  • Security Engineers
  • Product Managers
  • Solution and Application Architects
  • DevOps/DevSecOps Practitioners
  • Software Quality Assurance Managers
  • GRC Analysts

The Six Pillars of DevSecOps - Collaboration and Integration

Release Date: 02/20/2024

Working Group: DevSecOps

“Security can only be achieved through collaboration, not confrontation” is one of the defining principles of DevSecOps. Essentially, security is a team sport that requires various organizational roles to work together, including business leaders, domain experts, security personnel, architects, software developers, pentesters, SOC analysts, and product managers. This collaboration ensures that the threat landscape is well understood and that the organizational practices for IT activities, including the software development lifecycle, follow proper security hygiene.

This document highlights this fundamental DevSecOps principle. It provides practical insights that help organizations build a unified environment where security is not an isolated function, but an essential part of software development. This includes how to promote regular, open, and proactive communication between all parties, ensuring that all stakeholders are involved, informed, and working towards a shared vision.

Key Takeaways: 
  • Guiding principles for successful DevSecOps communication
  • How to implement a continuous role-based security training program at an organization
  • How various organizational roles collaborate in an end-to-end DevSecOps delivery pipeline
  • The communication and collaboration required amongst various organizational roles to integrate a new acquisition into existing DevSecOps processes
  • How DevSecOps collaboration principles apply to other technology practices and trends such as Zero Trust, AIOps, and MLSecOps

This publication is part of an entire series on the Six Pillars of DevSecOps. You can find all the papers in the series that have been released so far here.

Download this Resource

Bookmark
Share
Related resources
Zero Trust Guiding Principles v1.1
Zero Trust Guiding Principles v1.1
Strengthening Research Integrity with High-Performance Computing (HPC) Security
Strengthening Research Integrity with High-Perf...
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Six Key Use Cases for Continuous Controls Monitoring
Six Key Use Cases for Continuous Controls Monitoring
Published: 10/23/2024
Optimizing Secrets Management to Enhance Security and Reduce Costs
Optimizing Secrets Management to Enhance Security and Reduce Costs
Published: 10/22/2024
Top Threat #4 - Cloudy with a Chance of Breach: The Cloud Security Strategy Storm
Top Threat #4 - Cloudy with a Chance of Breach: The Cloud Security ...
Published: 10/21/2024
5 Behaviors for Transforming Your Cybersecurity Leadership
5 Behaviors for Transforming Your Cybersecurity Leadership
Published: 10/21/2024
Smart SOC 2: Automating Compliance with Drata and AWS
Smart SOC 2: Automating Compliance with Drata and AWS
November 12 | Online
6 Key Requirements to Multicloud Security
6 Key Requirements to Multicloud Security
November 13 | Online
Cloud Security Reimagined: Bridging the Cloud – DevSecOps - Applica...
December 4 | Online

Acknowledgements

Aristide Bouix Headshot Missing
Aristide Bouix

Aristide Bouix

Amit Butail
Amit Butail
Vice President Technology Risk and Control Evaluation

Amit Butail

Vice President Technology Risk and Control Evaluation

Amit is a cybersecurity and risk management leader with over 20 years of progressive experience.

Amit is actively involved as a Volunteer in the Cyber Security and CRISC of ISACA working group. He has been a working as a contributing author and helped for the research publication on DevSecOps Pillar 2 - Collaboration, Key Management Lifecycle Best Practices , CCM v4 - PCI DSS v4 mapping project of CSA. Volunteering as a Subject Matter...

Read more

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional

Michael Roza

Risk, Audit, Control and Compliance Professional

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Alexandria Leary
Alexandria Leary
Principal Cloud Security Consultant at ScaleSec

Alexandria Leary

Principal Cloud Security Consultant at ScaleSec

Ivan De Los Santos Headshot Missing
Ivan De Los Santos

Ivan De Los Santos

Darien Hirotsu Headshot Missing
Darien Hirotsu

Darien Hirotsu

Nitin Kulkarni Headshot Missing
Nitin Kulkarni

Nitin Kulkarni

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Abdul Sattar Headshot Missing
Abdul Sattar

Abdul Sattar

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training