ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Download Publication

Secure DevOps and Misconfigurations Survey Report
Secure DevOps and Misconfigurations Survey Report
Who it's for:
  • Cybersecurity Professionals
  • Secure Software Development Managers
  • Technical Directors

Secure DevOps and Misconfigurations Survey Report

Release Date: 11/18/2021

Working Group: DevSecOps

Secure DevOps, DevSecOps, and “shifting left” have become increasingly popular terms in cybersecurity. With the rapid increase both in volume and speed to delivery of applications, attacks on applications have also increased in both volume and complexity. Combine this with the shortage of cybersecurity professionals and lacking security skillsets, cybersecurity teams are already stretched to their limits. This has given rise to a DevSecOps approach, however, DevSecOps isn’t a silver bullet, organizations still face misconfigurations and other security challenges, struggle with implementing DevSecOps approach, and insufficient security skillsets

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
State of SaaS Security Report 2025
State of SaaS Security Report 2025
The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action
The Six Pillars of DevSecOps: Measure, Monitor,...
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
A Primer on Model Context Protocol (MCP) Secure Implementation
A Primer on Model Context Protocol (MCP) Secure Implementation
Published: 06/23/2025
Cloud Security: Whose Job Is It?
Cloud Security: Whose Job Is It?
Published: 06/23/2025
Runtime Integrity Measurement Overview
Runtime Integrity Measurement Overview
Published: 06/13/2025
Closing the Blind Spot in Enterprise DNS Security: Why DNS Posture Management Matters
Closing the Blind Spot in Enterprise DNS Security: Why DNS Posture ...
Published: 06/12/2025

Acknowledgements

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Frank Guanco
Frank Guanco
Operations Director, CSA

Frank Guanco

Operations Director, CSA

Sean Heide
Sean Heide

Sean Heide

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training