Reference pipeline
DevSecOps pipeline in 8 stages
From threat modeling on the story to runtime monitoring — security embedded at every gate.
1. Plan
Threat Modeling (STRIDE), abuse stories, data classification, privacy by design.
2. Code
SAST in IDE, secret scanning, secure coding training, golden paths per language.
3. Build
SCA, SBOM, signed container images, hardened base images, IaC scanning.
4. Test
DAST in staging, authenticated API fuzzing, contract tests on auth, load with chaos.
5. Release
Policy-as-code (OPA), SLSA v1.0, image signing (cosign), change-advisory automation.
6. Deploy
Kubernetes admission controllers, GitOps, canary with security gates.
7. Operate
CSPM, CWPP, RASP, runtime detections on EDR/XDR and SIEM correlations.
8. Monitor
MTTR by severity, escape rate, coverage %, ratio SAST/DAST/SCA fix vs. backlog.