⌂ Home

Securing the DevSecOps Pipeline

Security touchpoints at every phase—from backlog to production telemetry.

Pipeline phases and security touchpoints

Each phase can emit evidence for compliance and quality gates. Amber border highlights phases with common automated security checks.

Plan
Threat model, abuse cases, secure requirements
Code
Pre-commit hooks, secrets scan, peer review + security checklist
Build
SAST, SCA, IaC scan, signed artifacts
Test
DAST, fuzzing, contract tests for authZ
Release
Policy gates, SBOM, change approval, vuln SLA
Deploy
Immutable infra, secrets from vault, config validation
Operate
Hardening baselines, patching, break-glass procedures
Monitor
SIEM, CSPM, runtime alerts, incident drills

Scroll horizontally on small screens to view all phases.

SAST Code

Static analysis on source or bytecode before execution. Catches injection patterns, weak crypto usage, and dangerous APIs early in CI.

Examples: Semgrep, SonarQube, Checkmarx, Fortify.

DAST Running app

Black-box testing against a deployed environment. Finds misconfigurations, exposed admin panels, and runtime-only flaws.

Examples: OWASP ZAP, Burp Suite, stack-specific scanners.

SCA Dependencies

Inventory third-party libraries and match against CVE/GHSA databases. Often combined with license policy.

Examples: Snyk, Mend, OWASP Dependency-Check, OSV.

Penetration testing Human-led

Goal-oriented adversary simulation beyond tool signatures. Validates chains of vulnerabilities and detective controls.

Fit: Pre-release, major changes, or regulated cadence.

Quick reference: where controls live

PhaseTypical gatesArtifact
PlanThreat model sign-offDiagram + risk register
CodeNo secrets in diffHook logs
BuildSAST/SCA thresholdsSARIF, SBOM
TestDAST baseline diffScan report, tickets
ReleaseChange record, approvalsRelease notes, vuln exceptions
DeployIaC policy passPlan files, attestations
MonitorDetection coverageAlerts, MTTR metrics