logo
logo
Sign in

DevSecOps: The Six Pillars of Secure Code Deployment

avatar
Geekz Snow
DevSecOps: The Six Pillars of Secure Code Deployment

“You can’t manage what you can’t (or don’t) measure”

First there came DevOps, in which processes between software development and IT teams were automated to speed up the building, testing, and release of software.

Then with bad actors using automated vulnerability-finding tools, eagle-eyed regulators closely watching for data breaches, and code breaking regularly, DevSecOps was next.

As John Yeoh, VP of research for the Cloud Security Alliance notes: “The security risks inherent in today’s intricate interactions between multiple technology layers, coupled with the globally interconnected and always-on nature of today’s applications, have been compounded by vulnerabilities lying dormant in systems, software, and hardware.

The result is a field ripe for picking by malicious parties across the world.”

Now in a new report the non-profit Cloud Security Alliance (CSA) emphasises six key pillars that must be considered by organisations, in a new DevSecOps guide.

collect
0
avatar
Geekz Snow
guide
Zupyak is the world’s largest content marketing community, with over 400 000 members and 3 million articles. Explore and get your content discovered.
Read more