Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

Download Publication

The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration and Integration
Who it's for:
  • CISO/CIO/COO
  • Security Engineers
  • Product Managers
  • Solution and Application Architects
  • DevOps/DevSecOps Practitioners
  • Software Quality Assurance Managers
  • GRC Analysts

The Six Pillars of DevSecOps - Collaboration and Integration

Release Date: 02/20/2024

Working Group: DevSecOps

“Security can only be achieved through collaboration, not confrontation” is one of the defining principles of DevSecOps. Essentially, security is a team sport that requires various organizational roles to work together, including business leaders, domain experts, security personnel, architects, software developers, pentesters, SOC analysts, and product managers. This collaboration ensures that the threat landscape is well understood and that the organizational practices for IT activities, including the software development lifecycle, follow proper security hygiene.

This document highlights this fundamental DevSecOps principle. It provides practical insights that help organizations build a unified environment where security is not an isolated function, but an essential part of software development. This includes how to promote regular, open, and proactive communication between all parties, ensuring that all stakeholders are involved, informed, and working towards a shared vision.

Key Takeaways: 
  • Guiding principles for successful DevSecOps communication
  • How to implement a continuous role-based security training program at an organization
  • How various organizational roles collaborate in an end-to-end DevSecOps delivery pipeline
  • The communication and collaboration required amongst various organizational roles to integrate a new acquisition into existing DevSecOps processes
  • How DevSecOps collaboration principles apply to other technology practices and trends such as Zero Trust, AIOps, and MLSecOps

This publication is part of an entire series on the Six Pillars of DevSecOps. You can find all the papers in the series that have been released so far here.

Download this Resource

Bookmark
Share
Related resources
Enterprise Authority To Operate (EATO) Controls Framework
Enterprise Authority To Operate (EATO) Controls...
CCM v4.0 Implementation Guidelines
CCM v4.0 Implementation Guidelines
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
Incident Response in Cloud Security
Incident Response in Cloud Security
Published: 07/25/2024
Asking the Right Questions About ASPM
Asking the Right Questions About ASPM
Published: 07/24/2024
Cybersecurity Training for Employees: Upskill the Easy Way with CSA Team Training Programs
Cybersecurity Training for Employees: Upskill the Easy Way with CSA...
Published: 07/23/2024
New Cloud Security Guidance from CSA
New Cloud Security Guidance from CSA
Published: 07/17/2024

Acknowledgements

Aristide Bouix Headshot Missing
Aristide Bouix

Aristide Bouix

Amit Butail
Amit Butail
Vice President Technology Risk and Control Evaluation, Wells Fargo

Amit Butail

Vice President Technology Risk and Control Evaluation, Wells Fargo

Amit is a cybersecurity and risk management leader with over 20 years of progressive experience.

Amit is actively involved as a Volunteer in the Cyber Security and CRISC of ISACA working group. He has been a working as a contributing author and helped for the research publication on DevSecOps Pillar 2 - Collaboration, Key Management Lifecycle Best Practices , CCM v4 - PCI DSS v4 mapping project of CSA. Volunteering as a Subject Matter...

Read more

Michael Roza
Michael Roza
Risk, Control and Compliance Professional at EVC

Michael Roza

Risk, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Alexandria Leary
Alexandria Leary
Principal Cloud Security Consultant at ScaleSec

Alexandria Leary

Principal Cloud Security Consultant at ScaleSec

Ivan De Los Santos Headshot Missing
Ivan De Los Santos

Ivan De Los Santos

Darien Hirotsu Headshot Missing
Darien Hirotsu

Darien Hirotsu

Nitin Kulkarni Headshot Missing
Nitin Kulkarni

Nitin Kulkarni

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Abdul Sattar Headshot Missing
Abdul Sattar

Abdul Sattar

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training