Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

Download Publication

The Six Pillars of DevSecOps - Pragmatic Implementation
The Six Pillars of DevSecOps - Pragmatic Implementation
Who it's for:
  • CISOs
  • Application, platform, and security engineers/architects

The Six Pillars of DevSecOps - Pragmatic Implementation

Release Date: 12/14/2022

Working Group: DevSecOps

Organizations have a wide array of tools and solutions to choose from when implementing security into the software development process. They often end up procuring solutions that are hard to deploy or challenging to operationalize and observe. Instead, using a framework-agnostic DevSecOps model that focuses on application development and platform security allows organizations to approach security in DevOps pragmatically.

This publication outlines the practices, processes, and technologies that organizations should consider when building out any DevSecOps program. Readers will learn how to implement DevSecOps pragmatically, focusing on security covering all software, regardless of where it runs.  

Key Takeaways: 
  • The different role profiles to consider during DevSecOps adoption
  • Some of the common mistakes made when designing a DevSecOps team structure
  • How culture impacts velocity and performance
  • The characteristics of an optimized and productive culture
  • Which technologies and processes underpin the pragmatic implementation of DevSecOps
  • Considerations for various activities across all stages of the DevSecOps process, including threat modeling, developer training, security unit testing, penetration testing, GitOps, secrets and key management, chaos engineering, and much more

This publication is part of an entire series on the Six Pillars of DevSecOps. You can find all the papers in the series that have been released so far here.
Download this Resource

Bookmark
Share
Related resources
Enterprise Authority To Operate (EATO) Controls Framework
Enterprise Authority To Operate (EATO) Controls...
CCM v4.0 Implementation Guidelines
CCM v4.0 Implementation Guidelines
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
The Cybersecurity Tower of Babel Requires Focus on Business Fundamentals: Part 2
The Cybersecurity Tower of Babel Requires Focus on Business Fundame...
Published: 07/25/2024
Incident Response in Cloud Security
Incident Response in Cloud Security
Published: 07/25/2024
Asking the Right Questions About ASPM
Asking the Right Questions About ASPM
Published: 07/24/2024
Cybersecurity Training for Employees: Upskill the Easy Way with CSA Team Training Programs
Cybersecurity Training for Employees: Upskill the Easy Way with CSA...
Published: 07/23/2024

Acknowledgements

Roupe Sahans
Roupe Sahans
DevSecOps Leader

Roupe Sahans

DevSecOps Leader

Roupe leads DevSecOps delivery and thought leadership for technology and media clients embracing digital transformation.

Roupe started his DevOps journey in 2016, building containerised microservices on AWS for government platforms. He has since been working with engineers to c-suite executives to embed security and resilience into digital products, secure cloud services, and reduce cyber technical-debt.

Most recently Roupe ha...

Read more

Michael Roza
Michael Roza
Risk, Control and Compliance Professional at EVC

Michael Roza

Risk, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training