categories.delivery-automation Intermediate
How does DevSecOps integrate security into CI/CD pipelines?
DevSecOps Concept
"Shift Left Security": Move security checks as early as possible in development, rather than reviewing security only before deployment. The earlier a problem is found, the cheaper it is to fix.
Security Tools at Each CI/CD Stage
Code Commit Stage (Pre-commit / PR)
- Secret Scanning: Detect accidentally committed API keys and passwords (tools: GitGuardian, truffleHog)
- IDE security plugins: Real-time security issue hints for developers
Build Stage
- SAST (Static Application Security Testing): Analyze source code for vulnerabilities without executing it (tools: SonarQube, Semgrep, CodeQL)
- SCA (Software Composition Analysis): Scan third-party dependencies for known CVE vulnerabilities (tools: Snyk, OWASP Dependency-Check)
Packaging Stage
- Container Image Scanning: Scan Docker images for OS and package vulnerabilities (tools: Trivy, Grype, ECR scanning)
Post-Deployment
- DAST (Dynamic Application Security Testing): Penetration testing against the running application (tools: OWASP ZAP)
- Runtime Security: Detect anomalous container behavior at runtime (tools: Falco)
Security Gates
Set security gates in the pipeline: automatically fail when high-severity vulnerabilities are found (CVSS >= 7.0), blocking unsafe code from reaching production.
✦ AI Mock Interview
Type your answer and get instant AI feedback
Sign in to use AI scoring
