• Home
  • >
  • DevOps News
  • >
  • Integrating Security into Build Processes Signals DevSecOps Tipping Point – InApps 2022

Integrating Security into Build Processes Signals DevSecOps Tipping Point – InApps is an article under the topic Devops Many of you are most interested in today !! Today, let’s InApps.net learn Integrating Security into Build Processes Signals DevSecOps Tipping Point – InApps in today’s post !

Read more about Integrating Security into Build Processes Signals DevSecOps Tipping Point – InApps at Wikipedia



You can find content about Integrating Security into Build Processes Signals DevSecOps Tipping Point – InApps from the Wikipedia website

The journey to DevSecOps maturity does not neatly shift left along a software development lifecycle (SLDC). Companies start adding security into the testing phase and then usually integrate security as they deploy applications into production. The nearly 3,000 technical professionals and executives surveyed for the “2019 State of DevOps Report” believe these steps positively impact a company’s security posture. Yet, adding “security” to testing and deployment also increases friction between security and developer teams.

Unsurprisingly, only 38% of respondents that do not integrate security at all say security policies or processes improve their company’s security posture. The report, from Puppet, CircleCI and Splunk, uses the number of SDLC phases involved with security to gauge the level of integration. The testing and deployment are the two phases that are most likely to be integrated with security. Just doing this has a positive impact. Build is usually the next phase to be integrated. Overall, 74% of those reporting integration of at least three phases noted a positive impact on their company’s security posture. The requirements and design phase are most likely to deal with security at companies that integrate all five of the stages of software development.

2019 State of DevOps Report: Security integration and confidence in security posture

Level 1 (16% of the study) = No integration of security in any of the SDLC phases; Level 2 (22%) = Minimal integration (one of five phases); Level 3 (25%) = Selective integration (two of five phases); Level 4 (24%) = Significant integration (three or four of five phases); Level 5 (14%) = Full integration (all phases).

The study digs digs deeper to determine the security practices most likely to improve respondents’ outlook. Using regression analysis, the study found that collaboration on threat models and developer tools that allow security features to be implemented during the deployment phase have the greatest impact, but are also among the least common of the 15 security practices asked about. Echoing research from Tricentis, having security experts evaluate (and prioritize) automated software tests also has a big impact on security but occurs less often than 13 other practices.

Collaboration and friction between security and other teams

The higher the “level,” the more parts of the SDLC have involvement of “security”.

Thirty-eight percent of companies that do not integrate security into the SDLC also do not have friction between the security and development teams, probably because there is little collaboration. The first one or two development phases to be integrated see the occurrence of team conflict rise to 48%. Friction between the teams drops among those that claim to have software security covered from A to Z. By this point, there is a general acknowledgment that security is a shared responsibility, and fewer people believe security is a major constraint on delivering software quickly.

Read More:   Update The Serverless Database You Really Want

The exact definition of security integration is hard to pin down. Does it mean security is a factor in decision making across a corporation? Or does it mean that the security team is directly involved? The study found that 31% of have both a centralized security function and application delivery teams with designated security experts, and another 14% of companies have decentralized the security and instead have only team-based security experts. Size plays a role in how security is handled. Small companies are more likely to use a pure decentralized security organization. Plus, teams that have 10 or fewer members are significantly less likely to have a designated security expert.

In another survey, this one conducted by the Enterprise Strategy Group and co-sponsored by InApps sponsor Capsule8, found that 55% of incorporated security into their DevOps processes. It also reports that only 21% of respondents have more than half of cloud native applications being secured via involvement of a cybersecurity team.

There were many other interesting findings in “State of DevOps 2019 Report.” You will find below tweets that provide color on how quickly security vulnerabilities can be remediating. Taken as a whole, they remind us that on-demand deployment is valuable even when it is not utilized.

Capsule8, CircleCI, Puppet, and Tricentis are sponsors of InApps.

Feature image via Pixabay.

InApps is a wholly owned subsidiary of Insight Partners, an investor in the following companies mentioned in this article: Velocity, Tricentis.




Source: InApps.net

Rate this post
As a Senior Tech Enthusiast, I bring a decade of experience to the realm of tech writing, blending deep industry knowledge with a passion for storytelling. With expertise in software development to emerging tech trends like AI and IoT—my articles not only inform but also inspire. My journey in tech writing has been marked by a commitment to accuracy, clarity, and engaging storytelling, making me a trusted voice in the tech community.

Let’s create the next big thing together!

Coming together is a beginning. Keeping together is progress. Working together is success.

Let’s talk

Get a custom Proposal

Please fill in your information and your need to get a suitable solution.

    You need to enter your email to download

      Success. Downloading...