Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration and Integration
Who it's for:
  • CISO/CIO/COO
  • Security Engineers
  • Product Managers
  • Solution and Application Architects
  • DevOps/DevSecOps Practitioners
  • Software Quality Assurance Managers
  • GRC Analysts

The Six Pillars of DevSecOps - Collaboration and Integration

Release Date: 02/20/2024

Working Group: DevSecOps

“Security can only be achieved through collaboration, not confrontation” is one of the defining principles of DevSecOps. Essentially, security is a team sport that requires various organizational roles to work together, including business leaders, domain experts, security personnel, architects, software developers, pentesters, SOC analysts, and product managers. This collaboration ensures that the threat landscape is well understood and that the organizational practices for IT activities, including the software development lifecycle, follow proper security hygiene.

This document highlights this fundamental DevSecOps principle. It provides practical insights that help organizations build a unified environment where security is not an isolated function, but an essential part of software development. This includes how to promote regular, open, and proactive communication between all parties, ensuring that all stakeholders are involved, informed, and working towards a shared vision.

Key Takeaways: 
  • Guiding principles for successful DevSecOps communication
  • How to implement a continuous role-based security training program at an organization
  • How various organizational roles collaborate in an end-to-end DevSecOps delivery pipeline
  • The communication and collaboration required amongst various organizational roles to integrate a new acquisition into existing DevSecOps processes
  • How DevSecOps collaboration principles apply to other technology practices and trends such as Zero Trust, AIOps, and MLSecOps

This publication is part of an entire series on the Six Pillars of DevSecOps. You can find all the papers in the series that have been released so far here.

Download this Resource

Bookmark
Share
Related resources
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
The State of Security Remediation 2024
The State of Security Remediation 2024
10 Tips to Guide Your Cloud Email Security Strategy
10 Tips to Guide Your Cloud Email Security Strategy
Published: 04/17/2024
The Widening Overlap Between Cloud Workloads and Cybersecurity
The Widening Overlap Between Cloud Workloads and Cybersecurity
Published: 04/17/2024
How to Audit Your Outdated Security Processes
How to Audit Your Outdated Security Processes
Published: 04/16/2024
Sealing Pandora's Box - The Urgent Need for Responsible AI Governance
Sealing Pandora's Box - The Urgent Need for Responsible AI Governance
Published: 04/12/2024

Acknowledgements

Aristide Bouix Headshot Missing
Aristide Bouix

Aristide Bouix

This person does not have a biography listed with CSA.

Amit Butail
Amit Butail
Vice President Technology Risk and Control Evaluation, Wells Fargo

Amit Butail

Vice President Technology Risk and Control Evaluation, Wells Fargo

Amit is a cybersecurity and risk management leader with over 20 years of progressive experience.

Amit is actively involved as a Volunteer in the Cyber Security and CRISC of ISACA working group. He has been a working as a contributing author and helped for the research publication on DevSecOps Pillar 2 - Collaboration, Key Management Lifecycle Best Practices , CCM v4 - PCI DSS v4 mapping project of CSA. Volunteering as a Subject Matter...

Read more

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Alexandria Leary Headshot Missing
Alexandria Leary

Alexandria Leary

This person does not have a biography listed with CSA.

Ivan De Los Santos Headshot Missing
Ivan De Los Santos

Ivan De Los Santos

This person does not have a biography listed with CSA.

Darien Hirotsu Headshot Missing
Darien Hirotsu

Darien Hirotsu

This person does not have a biography listed with CSA.

Nitin Kulkarni Headshot Missing
Nitin Kulkarni

Nitin Kulkarni

This person does not have a biography listed with CSA.

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

This person does not have a biography listed with CSA.

Abdul Sattar Headshot Missing
Abdul Sattar

Abdul Sattar

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training