Security & Compliance #
Security and compliance should be embedded into delivery workflows from planning through operations.
Overview #
An effective DevSecOps baseline spans:
- Identity and access governance.
- Secrets and key lifecycle management.
- Software supply chain integrity.
- Runtime workload and network protections.
- Audit evidence and policy enforcement.
Treat these capabilities as a product, not a one-time project: assign ownership, set service-level objectives, and review outcomes quarterly.
Business outcomes and success metrics #
Security and compliance programs are easier to sustain when outcomes are measurable and tied to delivery performance.
Track a small set of leading and lagging indicators:
- Exposure reduction: percentage of critical assets protected by MFA, workload identity, and least-privilege policies.
- Detection and response: median time to detect (MTTD) and median time to contain (MTTC) high-severity events.
- Vulnerability management: SLA compliance for critical/high findings and exception age.
- Change safety: percentage of deployments blocked by policy gates and percentage resolved without emergency bypass.
- Audit readiness: time to produce requested evidence and number of repeat audit findings.
When to prioritize specific controls / decision criteria #
Prioritize controls based on:
- Data sensitivity and regulatory obligations.
- Internet exposure and threat profile.
- Change velocity and deployment frequency.
- Third-party dependencies and supplier risk.
A practical order for most teams:
- Identity hardening and least privilege.
- Secrets management and rotation.
- CI supply chain controls and artifact integrity.
- Runtime detection, response, and evidence automation.
For highly regulated workloads, run control mapping and evidence design early so teams do not need to retrofit auditability after launch.
Security architecture patterns #
1) Identity-first zero-trust baseline #
- Enforce MFA and conditional access.
- Use short-lived credentials and workload identities.
- Centralize privileged access workflows.
- Separate human and machine identities.
2) Shift-left plus policy gates #
- Run SAST/SCA/container checks on every pull request.
- Enforce policy-as-code before deployment.
- Block unsigned or unverified artifacts from promotion.
- Require security review for high-risk changes (auth, cryptography, network exposure).
3) Runtime defense-in-depth #
- Segment networks and restrict east-west traffic.
- Collect runtime telemetry with actionable detections.
- Define incident runbooks and escalation ownership.
- Validate recoverability with regular tabletop and technical response exercises.
Control domains to operationalize #
Identity and access management (IAM) #
- Adopt role-based or attribute-based access models.
- Enforce just-in-time privileged access for administrative actions.
- Automate periodic access reviews and dormant-account cleanup.
Secrets and key management #
- Keep application secrets in dedicated vault services.
- Rotate keys and credentials on defined intervals and on personnel/tooling changes.
- Use envelope encryption and managed KMS for data-at-rest controls.
Software supply chain security #
- Generate SBOMs for release artifacts.
- Sign artifacts and verify signatures at deployment time.
- Pin and verify build dependencies, including build images and CI actions.
- Isolate build systems from production credentials and runtime networks.
Runtime and platform security #
- Apply baseline hardening standards (OS, container, Kubernetes).
- Restrict outbound egress to approved destinations.
- Implement admission controls for policy and provenance checks.
- Continuously assess cloud and cluster posture for drift or risky exposure.
Compliance and audit guardrails #
Core baseline #
Framework mapping starter (example) #
-
Identity and access controls: map to SOC 2 CC6, ISO 27001 Annex A.5/A.8, NIST AC family.
-
Change and deployment controls: map to SOC 2 CC8, ISO 27001 Annex A.8/A.12, NIST CM family.
-
Monitoring and incident response: map to SOC 2 CC7, ISO 27001 Annex A.5/A.16, NIST IR family.
-
Supplier and dependency risk: map to SOC 2 CC9, ISO 27001 Annex A.5/A.15, NIST SR family.
-
Map technical controls to required frameworks (SOC 2, ISO 27001, HIPAA, PCI DSS).
-
Automate evidence collection from CI/CD, IAM, and runtime systems.
-
Maintain policy exceptions with owner, expiry, and compensating controls.
-
Schedule quarterly control reviews tied to risk register updates.
Cost and operational baseline #
- Focus on high-risk controls first to maximize risk reduction per effort.
- Reuse shared security services across teams where possible.
- Track control effectiveness, not just scanner volume.
Evidence model #
Build an evidence matrix with three columns:
- Control objective (what must be true).
- System of record (where proof is collected).
- Collection method (automated query, exported report, or attestation).
This simple model reduces audit scrambling and clarifies ownership long before external audits begin.
Implementation examples #
Example CI security gates #
- Dependency and container vulnerability scan.
- IaC policy and misconfiguration checks.
- Secret-detection checks on commits.
- Artifact signing and provenance generation.
- Deployment admission checks for signature/policy.
Example compliance evidence checklist #
- Access reviews and privileged activity logs.
- Change-management records tied to tickets/PRs.
- Vulnerability remediation SLAs and exceptions.
- Backup, restore, and incident response test results.
Example incident readiness checklist #
- Severity definitions and on-call roles documented.
- Escalation paths validated with contact tests.
- Forensic log retention meets policy requirements.
- Post-incident review template includes control and process updates.
Maturity roadmap (pragmatic) #
- Level 1 - Foundational: MFA, centralized logging, vulnerability scanning, baseline policies.
- Level 2 - Managed: policy gates in CI/CD, standard runbooks, automated evidence exports.
- Level 3 - Measurable: risk-based metrics, regular control testing, supplier-risk workflow.
- Level 4 - Adaptive: continuous verification, threat-informed controls, rapid exception governance.
Use the roadmap to sequence investments and avoid over-architecting controls before teams can operate them reliably.
Pitfalls / anti-patterns #
- Treating compliance as annual documentation only.
- Relying on long-lived shared credentials.
- Running scanners without remediation ownership.
- Ignoring third-party dependency and build-system risk.
- Creating too many one-off policy exceptions without expiry and review.
Related topics #
- DevSecOps
- Infrastructure as Code
- Configuration Management
- Operational Resilience
- Monitoring and Logging