ChaptersEventsBlog
Register now for NHIcon 2026, a half-day online event, to learn what the future of AI security requires.

Download Publication

The Six Pillars of DevSecOps - Pragmatic Implementation
The Six Pillars of DevSecOps - Pragmatic Implementation
Who it's for:
  • CISOs
  • Application, platform, and security engineers/architects

The Six Pillars of DevSecOps - Pragmatic Implementation

Release Date: 12/14/2022

Working Group: DevSecOps

Organizations have a wide array of tools and solutions to choose from when implementing security into the software development process. They often end up procuring solutions that are hard to deploy or challenging to operationalize and observe. Instead, using a framework-agnostic DevSecOps model that focuses on application development and platform security allows organizations to approach security in DevOps pragmatically.

This publication outlines the practices, processes, and technologies that organizations should consider when building out any DevSecOps program. Readers will learn how to implement DevSecOps pragmatically, focusing on security covering all software, regardless of where it runs.  

Key Takeaways: 
  • The different role profiles to consider during DevSecOps adoption
  • Some of the common mistakes made when designing a DevSecOps team structure
  • How culture impacts velocity and performance
  • The characteristics of an optimized and productive culture
  • Which technologies and processes underpin the pragmatic implementation of DevSecOps
  • Considerations for various activities across all stages of the DevSecOps process, including threat modeling, developer training, security unit testing, penetration testing, GitOps, secrets and key management, chaos engineering, and much more

This publication is part of an entire series on the Six Pillars of DevSecOps. You can find all the papers in the series that have been released so far here.
Download this Resource

Bookmark
Share
Related resources
Managing Privileged Access in a Cloud-First World
Managing Privileged Access in a Cloud-First World
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Why Your Copilot Needs a Security Co-Pilot: Enhancing GenAI with Deterministic Fixes
Why Your Copilot Needs a Security Co-Pilot: Enhancing GenAI with De...
Published: 12/10/2025
Security for AI Building, Not Security for AI Buildings
Security for AI Building, Not Security for AI Buildings
Published: 12/09/2025
Why Compliance as Code is the Future (And How to Get Started)
Why Compliance as Code is the Future (And How to Get Started)
Published: 12/04/2025
Navigating the Liminal Edge of AI Security: Deconstructing Prompt Injection, Model Poisoning, and Adversarial Perturbations in the Cognitive Cyber Domain
Navigating the Liminal Edge of AI Security: Deconstructing Prompt I...
Published: 12/01/2025

Interested in helping develop research with CSA?

Related Certificates & Training