{"id":2044,"date":"2022-12-01T14:22:07","date_gmt":"2022-12-01T14:22:07","guid":{"rendered":"https:\/\/www.ilinksolutions.com\/post\/?p=2044"},"modified":"2024-04-19T20:14:12","modified_gmt":"2024-04-19T20:14:12","slug":"devsecops-the-what-why-how","status":"publish","type":"post","link":"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/","title":{"rendered":"DevSecOps &#8211; The What, Why and How"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2047,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[3,8],"tags":[],"class_list":["post-2044","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-software-testing","entry"],"acf":{"short_description":"Agile, DevOps, and DevSecOps have all been trending for over a decade in the app development landscape. DevSecOps is, in many ways, like the upgraded, more secure version of DevOps, using Agile principles and practices to optimize development while keeping security front and center from the beginning and not as an afterthought.","hero_video":null,"block_1":"<h3>For over a decade, Agile, DevOps, and DevSecOps have been prominent trends in the app development landscape.<\/h3> \r\n\r\nDevSecOps, often seen as an enhanced and security-focused iteration of DevOps, incorporates <a href=\"https:\/\/www.ilinksolutions.com\/post\/what-we-do\/agile-software-engineering\/\">Agile Software Engineering<\/a> principles and practices to optimize development while prioritizing security from the outset, rather than treating it as an afterthought. Explore the emergence, principles, and benefits of DevSecOps for your organization.","image_block_1":"","block_2":"<h3>DevSecOps - The What, Why &amp; How<\/h3>\r\nHere\u2019s the what, why, and how of the DevSecOps world.\r\n<h3>The What<\/h3>\r\nDevSecOps involves integrating security throughout the development process from its early stages by bringing security engineers onto a DevOps team.\r\n<h3>The Why<\/h3>\r\nThis development movement was necessary to reduce the cost and time of deployment of <a href=\"https:\/\/www.ilinksolutions.com\/post\/streamline-business-operations-with-app-modernization\/\">modern applications<\/a> that need to focus on\u2014or are impacted by\u2014security features. The only other choice would be to retroactively integrate security considerations, which take time, cost money, and effect delivery timelines. An equally problematic alternative would be to allow users access to vulnerable applications until the identification and mitigation of security risks.\r\n<h3>The How<\/h3>\r\nTo use DevSecOps, a project manager will bring security professionals into the DevOps process at its early stages. Then, as multiple iterations are developed via sprints, the security team member plays an integral role in design decisions.\r\n<h2>The Rise of DevSecOps<\/h2>\r\nDevSecOps rose to prominence. Because dev teams needed to find a way to seamlessly integrate security features in the development lifecycle from its early stages. In this way, they can prevent wasting many work hours trying to implement security facets after the finalization. And then take it through complete test cycles all over again. This Shift Left model, is where we embed security from the beginning and take it through a common test cycle, in order to be cost-effective, and quickly turn around the product.\r\n\r\nFor example, suppose a web application has to meet stringent requirements on throughput to adequately serve customers. But end-users will frequently interact with the app through a firewall with limited throughput. In a DevSecOps environment, team members with a background in security can provide feedback to application design and infrastructure engineering teams to account for firewall impact and help build a solution that meets security requirements. In that way, the end-user experience isn\u2019t hindered by security features that would otherwise affect throughput.","block_3":"<h2>DevSecOps Best Practices<\/h2>\r\nHere are some best practices to ensure you get the most out of a DevSecOps environment:\r\n<ol>\r\n \t<li>Commit to DevSecOps early instead of transitioning from DevOps to DevSecOps partway through the dev lifecycle.<\/li>\r\n \t<li>Only choose security professionals with a genuine commitment to the process. They shouldn\u2019t be overly distracted by other cybersecurity projects, for example.<\/li>\r\n \t<li>Foster a culture that emphasizes equity between team members. Your security experts shouldn\u2019t feel like an extra appendage; they\u2019re an integral part of the team\u2019s circulatory system.<\/li>\r\n<\/ol>\r\n<h2>How DevSecOps Supports a Smooth CI\/CD Pipeline<\/h2>\r\nCI\/CD stands for continuous integration and either continuous delivery or continuous deployment. CI\/CD powers the software development lifecycle by enabling automation in builds, and performing various tests, and deployments. Such deployments could be frequent, well tested, and introduce small changes to existing applications in the production.\r\n\r\nDevSecOps, for many projects, is one of the most important elements contributing to a smooth CI\/CD pipeline. Because it prevents the dev team from having to stuff security into the process as if it\u2019s a round peg going unfit for a square hole.\r\n\r\nAs a simple example, consider the effect of incorporating automated testing that searches for security vulnerabilities throughout the dev process. Instead of waiting for a security vulnerability to reveal after the alpha or beta release, you can sniff it out early on. Also, after discovering each vulnerability, you have <a href=\"https:\/\/www.ilinksolutions.com\/post\/what-we-do\/cybersecurity\/\">cybersecurity<\/a> experts on the team to confer with regarding how to maintain app functionality while mitigating cyber risk.\r\n\r\ni-Link Solutions, is as an ISO-certified developer. It incorporates DevSecOps practices to ensure clients get secure apps that meet and exceed end-user expectations. Whether for the federal government, state government, or commercial applications, i-Link Solutions' CMMI Level 3 service provides clients with proactive and secure development, customized to meet their business goals. <a href=\"https:\/\/www.ilinksolutions.com\/post\/about\/in-the-news\/\">Connect with i-Link Solutions today to learn more.<\/a>","card_block_3":"","repeat_block":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DevSecOps - The What, Why and How - i-Link Solutions<\/title>\n<meta name=\"description\" content=\"i-Link Solutions incorporates DevSecOps practices to ensure clients get secure apps that meet and exceed end-user expectations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DevSecOps \u2013 The What, Why &amp; How\" \/>\n<meta property=\"og:description\" content=\"Here\u2019s a breakdown of how DevSecOps came on the scene, what it involves, and how it can work for your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/\" \/>\n<meta property=\"og:site_name\" content=\"i-Link Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-01T14:22:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-19T20:14:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/12\/DevSecOps.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"DevSecOps \u2013 The What, Why &amp; How\" \/>\n<meta name=\"twitter:description\" content=\"Here\u2019s a breakdown of how DevSecOps came on the scene, what it involves, and how it can work for your organization.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/12\/DevSecOps.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/person\/a39ce4a68ef63a9d47b0d0568410e1ab\"},\"headline\":\"DevSecOps &#8211; The What, Why and How\",\"datePublished\":\"2022-12-01T14:22:07+00:00\",\"dateModified\":\"2024-04-19T20:14:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/\"},\"wordCount\":7,\"publisher\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/12\/DevSecOps.jpg\",\"articleSection\":[\"Insights\",\"Software Testing\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/\",\"url\":\"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/\",\"name\":\"DevSecOps - The What, Why and How - i-Link Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/12\/DevSecOps.jpg\",\"datePublished\":\"2022-12-01T14:22:07+00:00\",\"dateModified\":\"2024-04-19T20:14:12+00:00\",\"description\":\"i-Link Solutions incorporates DevSecOps practices to ensure clients get secure apps that meet and exceed end-user expectations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/#primaryimage\",\"url\":\"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/12\/DevSecOps.jpg\",\"contentUrl\":\"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/12\/DevSecOps.jpg\",\"width\":1440,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ilinksolutions.com\/post\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DevSecOps &#8211; The What, Why and How\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#website\",\"url\":\"https:\/\/www.ilinksolutions.com\/post\/\",\"name\":\"i-Link Solutions\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ilinksolutions.com\/post\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#organization\",\"name\":\"i-Link Solutions\",\"url\":\"https:\/\/www.ilinksolutions.com\/post\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2020\/04\/logo.png\",\"contentUrl\":\"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2020\/04\/logo.png\",\"width\":228,\"height\":80,\"caption\":\"i-Link Solutions\"},\"image\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/person\/a39ce4a68ef63a9d47b0d0568410e1ab\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/172a84a56feea1d4e81535eaa9fdfbc1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/172a84a56feea1d4e81535eaa9fdfbc1?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/www.ilinksolutions.com\/post\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DevSecOps - The What, Why and How - i-Link Solutions","description":"i-Link Solutions incorporates DevSecOps practices to ensure clients get secure apps that meet and exceed end-user expectations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/","og_locale":"en_US","og_type":"article","og_title":"DevSecOps \u2013 The What, Why & How","og_description":"Here\u2019s a breakdown of how DevSecOps came on the scene, what it involves, and how it can work for your organization.","og_url":"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/","og_site_name":"i-Link Solutions","article_published_time":"2022-12-01T14:22:07+00:00","article_modified_time":"2024-04-19T20:14:12+00:00","og_image":[{"width":1440,"height":450,"url":"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/12\/DevSecOps.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"DevSecOps \u2013 The What, Why & How","twitter_description":"Here\u2019s a breakdown of how DevSecOps came on the scene, what it involves, and how it can work for your organization.","twitter_image":"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/12\/DevSecOps.jpg","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/#article","isPartOf":{"@id":"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/"},"author":{"name":"admin","@id":"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/person\/a39ce4a68ef63a9d47b0d0568410e1ab"},"headline":"DevSecOps &#8211; The What, Why and How","datePublished":"2022-12-01T14:22:07+00:00","dateModified":"2024-04-19T20:14:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/"},"wordCount":7,"publisher":{"@id":"https:\/\/www.ilinksolutions.com\/post\/#organization"},"image":{"@id":"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/12\/DevSecOps.jpg","articleSection":["Insights","Software Testing"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/","url":"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/","name":"DevSecOps - The What, Why and How - i-Link Solutions","isPartOf":{"@id":"https:\/\/www.ilinksolutions.com\/post\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/#primaryimage"},"image":{"@id":"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/12\/DevSecOps.jpg","datePublished":"2022-12-01T14:22:07+00:00","dateModified":"2024-04-19T20:14:12+00:00","description":"i-Link Solutions incorporates DevSecOps practices to ensure clients get secure apps that meet and exceed end-user expectations.","breadcrumb":{"@id":"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/#primaryimage","url":"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/12\/DevSecOps.jpg","contentUrl":"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/12\/DevSecOps.jpg","width":1440,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.ilinksolutions.com\/post\/devsecops-the-what-why-how\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ilinksolutions.com\/post\/"},{"@type":"ListItem","position":2,"name":"DevSecOps &#8211; The What, Why and How"}]},{"@type":"WebSite","@id":"https:\/\/www.ilinksolutions.com\/post\/#website","url":"https:\/\/www.ilinksolutions.com\/post\/","name":"i-Link Solutions","description":"","publisher":{"@id":"https:\/\/www.ilinksolutions.com\/post\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ilinksolutions.com\/post\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.ilinksolutions.com\/post\/#organization","name":"i-Link Solutions","url":"https:\/\/www.ilinksolutions.com\/post\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/logo\/image\/","url":"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2020\/04\/logo.png","contentUrl":"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2020\/04\/logo.png","width":228,"height":80,"caption":"i-Link Solutions"},"image":{"@id":"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/person\/a39ce4a68ef63a9d47b0d0568410e1ab","name":"admin","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/172a84a56feea1d4e81535eaa9fdfbc1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/172a84a56feea1d4e81535eaa9fdfbc1?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/www.ilinksolutions.com\/post\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/posts\/2044"}],"collection":[{"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/comments?post=2044"}],"version-history":[{"count":14,"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/posts\/2044\/revisions"}],"predecessor-version":[{"id":3429,"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/posts\/2044\/revisions\/3429"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/media\/2047"}],"wp:attachment":[{"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/media?parent=2044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/categories?post=2044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/tags?post=2044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}