Cloud 101CircleEventsBlog
Get 50% off the Cloud Infrastructure Security training bundle with code 'unlock50advantage'

Download Publication

The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action
The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action
Who it's for:
  • CISOs
  • DevSecOps Engineers
  • Cybersecurity Managers, Analysts, and Architects
  • Incident Response Coordinators 
  • Compliance Officers 
  • Software Developers

The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action

Release Date: 05/14/2024

Working Group: DevSecOps

The implementation and maintenance of DevSecOps initiatives can take anywhere from a few months to several years to implement. Therefore, continuous measurement is essential when attempting to understand what changes have occurred in people, processes, and tooling. Without actionable DevSecOps metrics and observability, teams cannot measure performance, understand progress, replicate success, or recognize failures. These characteristics are essential for establishing a robust security posture.

This publication discusses how measuring, monitoring, and reporting are crucial for understanding and improving security practices within software development lifecycles. DevOps teams of all maturity levels will learn how to turn security metrics into reportable and observable data.

Key Takeaways: 
  • How to make vulnerability, security architecture, and incident response data observable and actionable
  • How varying levels of DevSecOps maturity impact security observability and response
  • The importance of continuous measurement
  • How to enhance DevOps observability through reporting, including making data accessible, highlighting areas of opportunity, driving continuous improvement, and encouraging communication and collaboration

This publication is part of an entire series on the Six Pillars of DevSecOps. You can find all the papers in the series that have been released so far here.
Download this Resource

Bookmark
Share
Related resources
Cloud Security for Startups 2024
Cloud Security for Startups 2024
Key Management for Public Cloud Migration
Key Management for Public Cloud Migration
Top Threats to Cloud Computing 2024 - Japanese Translation
Top Threats to Cloud Computing 2024 - Japanese ...
How to Demystify Zero Trust for Non-Security Stakeholders
How to Demystify Zero Trust for Non-Security Stakeholders
Published: 12/19/2024
Why Digital Pioneers are Adopting Zero Trust SD-WAN to Drive Modernization
Why Digital Pioneers are Adopting Zero Trust SD-WAN to Drive Modern...
Published: 12/19/2024
Managed Security Service Provider (MSSP): Everything You Need to Know
Managed Security Service Provider (MSSP): Everything You Need to Know
Published: 12/18/2024
Zero-Code Cloud: Building Secure, Automated Infrastructure Without Writing a Line
Zero-Code Cloud: Building Secure, Automated Infrastructure Without ...
Published: 12/16/2024

Acknowledgements

Roupe Sahans
Roupe Sahans
DevSecOps Leader

Roupe Sahans

DevSecOps Leader

Roupe leads DevSecOps delivery and thought leadership for technology and media clients embracing digital transformation.

Roupe started his DevOps journey in 2016, building containerised microservices on AWS for government platforms. He has since been working with engineers to c-suite executives to embed security and resilience into digital products, secure cloud services, and reduce cyber technical-debt.

Most recently Roupe ha...

Read more

Daniel Gora Headshot Missing
Daniel Gora

Daniel Gora

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.

Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. His lea...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training