ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Download Publication

The Six Pillars of DevSecOps - Pragmatic Implementation
The Six Pillars of DevSecOps - Pragmatic Implementation
Who it's for:
  • CISOs
  • Application, platform, and security engineers/architects

The Six Pillars of DevSecOps - Pragmatic Implementation

Release Date: 12/14/2022

Working Group: DevSecOps

Organizations have a wide array of tools and solutions to choose from when implementing security into the software development process. They often end up procuring solutions that are hard to deploy or challenging to operationalize and observe. Instead, using a framework-agnostic DevSecOps model that focuses on application development and platform security allows organizations to approach security in DevOps pragmatically.

This publication outlines the practices, processes, and technologies that organizations should consider when building out any DevSecOps program. Readers will learn how to implement DevSecOps pragmatically, focusing on security covering all software, regardless of where it runs.  

Key Takeaways: 
  • The different role profiles to consider during DevSecOps adoption
  • Some of the common mistakes made when designing a DevSecOps team structure
  • How culture impacts velocity and performance
  • The characteristics of an optimized and productive culture
  • Which technologies and processes underpin the pragmatic implementation of DevSecOps
  • Considerations for various activities across all stages of the DevSecOps process, including threat modeling, developer training, security unit testing, penetration testing, GitOps, secrets and key management, chaos engineering, and much more

This publication is part of an entire series on the Six Pillars of DevSecOps. You can find all the papers in the series that have been released so far here.
Download this Resource

Bookmark
Share
Related resources
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Zero Trust Guidance for IoT
Zero Trust Guidance for IoT
State of SaaS Security Report 2025
State of SaaS Security Report 2025
What Kind of Identity Should Your AI Agent Have?
What Kind of Identity Should Your AI Agent Have?
Published: 06/25/2025
ESXi Ransomware: The Growing Threat to Virtualized Environments
ESXi Ransomware: The Growing Threat to Virtualized Environments
Published: 06/25/2025
A Primer on Model Context Protocol (MCP) Secure Implementation
A Primer on Model Context Protocol (MCP) Secure Implementation
Published: 06/23/2025
Cloud Security: Whose Job Is It?
Cloud Security: Whose Job Is It?
Published: 06/23/2025

Acknowledgements

Roupe Sahans
Roupe Sahans
DevSecOps Leader

Roupe Sahans

DevSecOps Leader

Roupe leads DevSecOps delivery and thought leadership for technology and media clients embracing digital transformation.

Roupe started his DevOps journey in 2016, building containerised microservices on AWS for government platforms. He has since been working with engineers to c-suite executives to embed security and resilience into digital products, secure cloud services, and reduce cyber technical-debt.

Most recently Roupe ha...

Read more

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training