categories.delivery-automation Intermediate

How does DevSecOps integrate security into CI/CD pipelines?

AI Practice

DevSecOps Concept

"Shift Left Security": Move security checks as early as possible in development, rather than reviewing security only before deployment. The earlier a problem is found, the cheaper it is to fix.

Security Tools at Each CI/CD Stage

Code Commit Stage (Pre-commit / PR)

  • Secret Scanning: Detect accidentally committed API keys and passwords (tools: GitGuardian, truffleHog)
  • IDE security plugins: Real-time security issue hints for developers

Build Stage

  • SAST (Static Application Security Testing): Analyze source code for vulnerabilities without executing it (tools: SonarQube, Semgrep, CodeQL)
  • SCA (Software Composition Analysis): Scan third-party dependencies for known CVE vulnerabilities (tools: Snyk, OWASP Dependency-Check)

Packaging Stage

  • Container Image Scanning: Scan Docker images for OS and package vulnerabilities (tools: Trivy, Grype, ECR scanning)

Post-Deployment

  • DAST (Dynamic Application Security Testing): Penetration testing against the running application (tools: OWASP ZAP)
  • Runtime Security: Detect anomalous container behavior at runtime (tools: Falco)

Security Gates

Set security gates in the pipeline: automatically fail when high-severity vulnerabilities are found (CVSS >= 7.0), blocking unsafe code from reaching production.

✦ AI Mock Interview

Type your answer and get instant AI feedback

Sign in to use AI scoring

Copyright © 2026 Wood All Rights Reserved · FE Interview Hub