DevSecOps: Where Security Testing Should Live in Your Pipeline

DevSecOps has become one of those terms that means different things to different organisations. The unifying idea is that security testing belongs inside the development pipeline rather than tacked on at the end. That principle is sound. The execution varies considerably between organisations that genuinely integrate security and those that simply added a scanner to the build job and called it a transformation. Getting it right requires choices about which tests to run where, and what to do with the results.

Different Tests Belong At Different Stages

Static analysis tools work best at the commit stage, where they catch issues before code is merged. Dependency scanning belongs at build time, where it can flag known vulnerable libraries before they ship. Dynamic application testing belongs in a deployed test environment, where the running application can be exercised. Each of these stages has its own constraints around speed, depth and noise tolerance. A focused web application pen testing engagement should complement the pipeline tests rather than duplicate them.

Findings That Block Deployment Need To Be Genuine

A pipeline that blocks deployment for every finding the scanners produce will be circumvented within a week. Engineering teams need confidence that the things blocking their deployment are real, important and actionable. That requires curation. Suppress known false positives explicitly. Tune the thresholds for severity. Make sure the blocking criteria reflect actual risk rather than arbitrary tool defaults. The credibility of the security gate matters more than the strictness.

Expert Commentary

William Fieldhouse, Director of Aardwolf Security Ltd

The teams that succeed with DevSecOps treat the security tools as part of their engineering platform. They tune the scanners, suppress noise actively and treat security findings with the same workflow as any other build issue. The teams that fail treat security as an external imposition, ignore the alerts and routinely override the gates to ship anyway.

Article image

Security Champions Bridge The Gap

A security champions programme places security-minded engineers in each development team. The champion is not a full time security specialist. They are an engineer with security training who serves as the team interface to the central security function. The programme scales security knowledge into development teams in a way that no central team can match through reviews alone. Worth investing in the champions programme as a long term capability rather than a one-off initiative. The relationships and knowledge transfer take time to mature, and the cumulative benefit grows considerably over multiple years.

Manual Testing Still Has A Role

Automation cannot find every issue. Business logic flaws, complex authorisation bugs and architectural mistakes survive the pipeline. Build in periodic penetration testing quote that includes manual testing at major release boundaries, and treat the findings as inputs to refine the pipeline detections going forward. The combination beats either approach alone.

DevSecOps works when it is treated as a culture change supported by tools. It fails when it is treated as a tool change supported by culture. DevSecOps works when the engineering culture absorbs security as part of normal work. The teams that achieve this rarely look back. DevSecOps is fundamentally a cultural change supported by tooling. The organisations that adopt the cultural change get value from the tooling. The organisations that adopt the tooling without the cultural change tend to produce expensive disappointments.