{"id":11910,"date":"2019-02-20T14:54:45","date_gmt":"2019-02-20T13:54:45","guid":{"rendered":"https:\/\/www.devon.nl\/?page_id=11910"},"modified":"2025-07-02T10:17:12","modified_gmt":"2025-07-02T08:17:12","slug":"what-is-devsecops","status":"publish","type":"page","link":"https:\/\/old.devon.nl\/en\/what-is-devsecops\/","title":{"rendered":"What is DevSecOps"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[mk_page_section bg_image=&#8221;https:\/\/old.devon.nl\/wp-content\/uploads\/2018\/01\/shutterstock_610258601.jpg&#8221; bg_position=&#8221;center center&#8221; bg_stretch=&#8221;true&#8221; video_color_mask=&#8221;#000000&#8243; min_height=&#8221;250&#8243; js_vertical_centered=&#8221;true&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_fancy_title tag_name=&#8221;h1&#8243; color=&#8221;#ffffff&#8221; size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;40&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; align=&#8221;center&#8221;]What is DevSecops?[\/mk_fancy_title][\/vc_column][\/mk_page_section][mk_page_section][vc_column width=&#8221;2\/3&#8243;][mk_padding_divider size=&#8221;30&#8243;][mk_fancy_title color=&#8221;#ff5000&#8243; size=&#8221;30&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; txt_transform=&#8221;uppercase&#8221; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; responsive_align=&#8221;left&#8221;]What is DevSecOps?[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1551789285522{margin-bottom: 0px !important;}&#8221;]We know the <strong><a href=\"https:\/\/old.devon.nl\/en\/what-is-devops\/\">goal of DevOps<\/a><\/strong>: is to bridge Development and Operations for a faster time-to-market and rapid customer satisfaction and feedback. The goal of DevSecOps is to bridge the security gap between both Development and Operations for more secure and faster software delivery. In many DevOps implementations and practices, security often ends up being the late comer, delaying the process of release and thus impeding all the benefits of DevOps and Agile software development.<\/p>\n<p>\u201cEveryone is responsible for security\u201d aims at bringing the idea that security is not only the responsibility of the security team. Security is the responsibility of everyone that is involved in building and managing software and IT systems. This includes: developers, line managers, business analysts, product owners, IT managers, portfolio managers, testers, quality assurance professionals, UX specialists and database administrators.[\/vc_column_text][mk_fancy_title margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221;]\n<h2>Podcast: Why do we need DevSecOps?<\/h2>\n[\/mk_fancy_title][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZvcGVuLnNwb3RpZnkuY29tJTJGZW1iZWQtcG9kY2FzdCUyRmVwaXNvZGUlMkY2bG1yMFdKTmlPN0VwMVhBalgxVlpiJTIyJTIwd2lkdGglM0QlMjIxMDAlMjUlMjIlMjBoZWlnaHQlM0QlMjIyMzIlMjIlMjBmcmFtZWJvcmRlciUzRCUyMjAlMjIlMjBhbGxvd3RyYW5zcGFyZW5jeSUzRCUyMnRydWUlMjIlMjBhbGxvdyUzRCUyMmVuY3J5cHRlZC1tZWRpYSUyMiUzRSUzQyUyRmlmcmFtZSUzRQ==[\/vc_raw_html][\/vc_column][vc_column width=&#8221;1\/3&#8243;][mk_padding_divider size=&#8221;30&#8243;][mk_image src=&#8221;https:\/\/old.devon.nl\/wp-content\/uploads\/2021\/06\/336&#215;2800.png&#8221; image_size=&#8221;full&#8221; link=&#8221;https:\/\/old.devon.nl\/en\/high-performing-devops-enterprises-book\/&#8221;][mk_fancy_title tag_name=&#8221;span&#8221; color=&#8221;#ff5000&#8243; size=&#8221;25&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; responsive_align=&#8221;left&#8221; el_class=&#8221;#case-study&#8221;]<a href=\"#case\">Case Study &#8211; Implementing security into DevOps<\/a>[\/mk_fancy_title][mk_image src=&#8221;https:\/\/old.devon.nl\/wp-content\/uploads\/2019\/01\/case-study-devsecops-1.png&#8221; image_width=&#8221;221&#8243; image_height=&#8221;300&#8243; link=&#8221;#case&#8221; align=&#8221;center&#8221;][\/vc_column][\/mk_page_section][mk_page_section bg_color=&#8221;#e0e0e0&#8243; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;20&#8243;][mk_fancy_title tag_name=&#8221;span&#8221; color=&#8221;#000000&#8243; size=&#8221;20&#8243; font_weight=&#8221;300&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; align=&#8221;center&#8221;]\n<div class=\" vc_custom_1550674846563\">\n<div id=\"text-block-8\" class=\"mk-text-block \">\n<div class=\" vc_custom_1540373756024\">\n<div id=\"text-block-8\" class=\"mk-text-block \">\n<p><em>&#8220;The purpose and intent of DevSecOps is to build on the mindset that \u201ceveryone is responsible for security\u201d with the goal of safely distributing security decisions at speed and scale to those who hold the highest level of context without sacrificing the safety required&#8221;<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n[\/mk_fancy_title][mk_fancy_title tag_name=&#8221;span&#8221; color=&#8221;#000000&#8243; size=&#8221;25&#8243; font_weight=&#8221;300&#8243; font_family=&#8221;none&#8221; align=&#8221;right&#8221;]\n<div class=\" vc_custom_1550674846563\">\n<div id=\"text-block-8\" class=\"mk-text-block \">\n<div class=\" vc_custom_1540373756024\">\n<div id=\"text-block-8\" class=\"mk-text-block \">\n<p style=\"text-align: center;\"><em>&#8211; devsecops.org &#8211;\u00a0<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n[\/mk_fancy_title][\/vc_column][\/mk_page_section][mk_page_section][vc_column][mk_fancy_title color=&#8221;#ff5000&#8243; size=&#8221;30&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; txt_transform=&#8221;uppercase&#8221; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; responsive_align=&#8221;left&#8221;]The benefits of DevSecOps[\/mk_fancy_title][vc_row_inner][vc_column_inner][mk_fancy_title tag_name=&#8221;h3&#8243; color=&#8221;#498fab&#8221; size=&#8221;20&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;16&#8243; size_tablet=&#8221;16&#8243; size_phone=&#8221;16&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; responsive_align=&#8221;left&#8221;]#1 Improved quality and security[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1551110336424{margin-bottom: 0px !important;}&#8221;]Improved collaboration between security and DevOps teams so that the <strong>quality and security of the software increases exponentially<\/strong>. With DevSecOps, vulnerabilities in code and design are identified very early in the software development lifecycle. Moreover, IT operations plan the infrastructure needs with security software development frameworks, hardened services, containers, and virtual machine images. All whilst keeping the desired state configuration and infrastructure as code in mind. New development methods like \u201cCompliance as Code\u201d express security and compliance requirements in the form of version controlled human readable code. This enhances audit trails, and aids in quick and repeatable security tests against the hardened infrastructure.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_fancy_title tag_name=&#8221;h3&#8243; color=&#8221;#498fab&#8221; size=&#8221;20&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;16&#8243; size_tablet=&#8221;16&#8243; size_phone=&#8221;16&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; responsive_align=&#8221;left&#8221;]#2 Baked-in security[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1551192298251{margin-bottom: 0px !important;}&#8221;]The most important win in a DevSecOps implementation is that security is baked into the entire software development and IT processes <strong>much earlier<\/strong>. Opposed to being bolted on after the software developed and deployed.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_fancy_title tag_name=&#8221;h3&#8243; color=&#8221;#498fab&#8221; size=&#8221;20&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;16&#8243; size_tablet=&#8221;16&#8243; size_phone=&#8221;16&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; responsive_align=&#8221;left&#8221;]#3 Faster software delivery[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1551110011026{margin-bottom: 0px !important;}&#8221;]Because vulnerabilities are identified at an earlier stage, DevSecOps can also help to speed up software deliveries. We have seen multiple organizations where DevSecOps initiatives resulted in faster time-to-market\u00a0because security and compliance requirements were no longer slowing down the software delivery speeds (see case study).[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_fancy_title tag_name=&#8221;h3&#8243; color=&#8221;#498fab&#8221; size=&#8221;20&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;16&#8243; size_tablet=&#8221;16&#8243; size_phone=&#8221;16&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; responsive_align=&#8221;left&#8221;]#4 People are more involved[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1551099606890{margin-bottom: 0px !important;}&#8221;]Because security is baked into the development process, ownership of security lies with everyone involved in DevOps so people feel more accountable.<\/p>\n<p>Security becomes a continuous process and continuous thought and rarely gets off of peoples radar.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/mk_page_section][mk_page_section][vc_column width=&#8221;2\/3&#8243;][mk_fancy_title color=&#8221;#ff5000&#8243; size=&#8221;30&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; txt_transform=&#8221;uppercase&#8221; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; responsive_align=&#8221;left&#8221;]How to start with DevSecOps?[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1550671007752{margin-bottom: 0px !important;}&#8221;]Now we know the answer to \u201cWhat is DevSecOps\u201d and \u201cWhat are its benefits\u201d, we can go to the next step: How do you start?[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551108228976{margin-bottom: 0px !important;}&#8221;]<strong>1) Identify your organizations&#8217; security posture and assess <\/strong>what kind of tools, practices are in place to ensure security. Identify the areas where security does not adequately catch up with the speed of business delivery and does not cater to the needs of business (due to traditional security practices and tools).<\/p>\n<p><strong>2) Start with a small pilot<\/strong> DevSecOps initiative with one Business Unit or Software Delivery Team which has faced security challenges and that could take advantage of the DevSecOps benefits.<\/p>\n<p><strong>3)<\/strong> <strong>Train your workforce<\/strong> such that the Business Analysts and Product Owners know what security risks they are up against. But also that developers and operations know how to secure by design and how to respond in case of a security incident.<\/p>\n<p><strong>4)<\/strong> <strong>Leverage the state of the art security tooling<\/strong> to bring security closer to developers and into their well-known build systems. Always remember to stay focused and bring security in earlier into the software development lifecycle. But also to take advantage of techniques like Agile Threat Modelling. This helps you to focus on security testing efforts and to identify technical security requirements right before you start coding.<\/p>\n<p><strong>5) Bring in automated scanning techniques<\/strong> to reject build check-ins if the software contains vulnerable versions of open source software libraries and third-party components.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][mk_fancy_title tag_name=&#8221;span&#8221; color=&#8221;#ff5000&#8243; size=&#8221;25&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; responsive_align=&#8221;left&#8221;]<a id=\"case\"><\/a>Download the case study[\/mk_fancy_title][mk_image src=&#8221;https:\/\/old.devon.nl\/wp-content\/uploads\/2019\/01\/case-study-devsecops-1.png&#8221; image_width=&#8221;221&#8243; image_height=&#8221;300&#8243; align=&#8221;center&#8221;][vc_raw_html css=&#8221;&#8221;]JTNDc2NyaXB0JTIwY2hhcnNldCUzRCUyMnV0Zi04JTIyJTIwdHlwZSUzRCUyMnRleHQlMkZqYXZhc2NyaXB0JTIyJTIwc3JjJTNEJTIyJTJGJTJGanMuaHNmb3Jtcy5uZXQlMkZmb3JtcyUyRmVtYmVkJTJGdjIuanMlMjIlM0UlM0MlMkZzY3JpcHQlM0UlMEElM0NzY3JpcHQlM0UlMEElMjAlMjBoYnNwdC5mb3Jtcy5jcmVhdGUlMjglN0IlMEElMjAlMjAlMjAlMjByZWdpb24lM0ElMjAlMjJuYTElMjIlMkMlMEElMjAlMjAlMjAlMjBwb3J0YWxJZCUzQSUyMCUyMjIwMjM5NzgyJTIyJTJDJTBBJTIwJTIwJTIwJTIwZm9ybUlkJTNBJTIwJTIyZGFiYTdiZTctM2YwMC00MTIzLWJkOTUtYzI4NWZmZGRhNGFhJTIyJTBBJTIwJTIwJTdEJTI5JTNCJTBBJTNDJTJGc2NyaXB0JTNF[\/vc_raw_html][\/vc_column][\/mk_page_section][mk_page_section][vc_column][mk_fancy_title color=&#8221;#ff5000&#8243; size=&#8221;30&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; txt_transform=&#8221;uppercase&#8221; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; responsive_align=&#8221;left&#8221;]Our DevSecOps services[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1718960555240{margin-bottom: 0px !important;}&#8221;]DevOn helps organizations to radically improve their software development. We help them to reap the benefits of DevSecOps through\u00a0<strong><a href=\"https:\/\/old.devon.nl\/en\/devsecops\/\">consultancy<\/a><\/strong>\u00a0and\u00a0<strong><a href=\"https:\/\/old.devon.nl\/en\/training-courses\/\">training<\/a>\u00a0<\/strong>so\u00a0they can\u00a0stay ahead of their competitors.<\/p>\n<p>Having trouble finding enough experienced developers who can help you with software development? DevOn\u00a0can also help your organization with this by offering <strong><a href=\"https:\/\/old.devon.nl\/en\/ai-powered-high-performance-teams\/\">AI Powered High-Performance Teams<\/a><\/strong>. If you would like to know more, please\u00a0<strong><a href=\"mailto:info@devon.nl\">contact us<\/a><\/strong>![\/vc_column_text][\/vc_column][\/mk_page_section][mk_page_section bg_color=&#8221;#e0e0e0&#8243; sidebar=&#8221;sidebar-1&#8243;][vc_column width=&#8221;2\/3&#8243;][mk_padding_divider size=&#8221;30&#8243;][mk_fancy_title color=&#8221;#000000&#8243; size=&#8221;20&#8243; font_weight=&#8221;300&#8243; txt_transform=&#8221;uppercase&#8221; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; align=&#8221;center&#8221;]Curious how you could put DevSecOps into practice? Follow one of our <a href=\"https:\/\/old.devon.nl\/en\/training-courses\/devsecops\/\"><strong>training courses<\/strong><\/a>![\/mk_fancy_title][\/vc_column][vc_column width=&#8221;1\/3&#8243;][mk_padding_divider size=&#8221;20&#8243;][mk_button dimension=&#8221;flat&#8221; corner_style=&#8221;rounded&#8221; size=&#8221;medium&#8221; url=&#8221;https:\/\/old.devon.nl\/en\/training-courses\/&#8221; align=&#8221;center&#8221; margin_top=&#8221;10&#8243;]All training courses[\/mk_button][\/vc_column][\/mk_page_section]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[mk_page_section bg_image=&#8221;https:\/\/old.devon.nl\/wp-content\/uploads\/2018\/01\/shutterstock_610258601.jpg&#8221; bg_position=&#8221;center center&#8221; bg_stretch=&#8221;true&#8221; video_color_mask=&#8221;#000000&#8243; min_height=&#8221;250&#8243; js_vertical_centered=&#8221;true&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_fancy_title tag_name=&#8221;h1&#8243; color=&#8221;#ffffff&#8221; size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;40&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; align=&#8221;center&#8221;]What is DevSecops?[\/mk_fancy_title][\/vc_column][\/mk_page_section][mk_page_section][vc_column width=&#8221;2\/3&#8243;][mk_padding_divider size=&#8221;30&#8243;][mk_fancy_title color=&#8221;#ff5000&#8243; size=&#8221;30&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; txt_transform=&#8221;uppercase&#8221; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; responsive_align=&#8221;left&#8221;]What is DevSecOps?[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1551789285522{margin-bottom: 0px !important;}&#8221;]We know the goal of DevOps: is to bridge Development and Operations for a faster time-to-market and rapid [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-11910","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is DevSecOps - DevOn<\/title>\n<meta name=\"description\" content=\"From Code to Cloud\u2014Securely.Discover how DevOn helps teams integrate automated security into every step of the SDLC.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Case study: DevSecOps\" \/>\n<meta property=\"og:description\" content=\"Download the free DevSecOps case study: &quot;Implementing Security into DevOps&quot; op https:\/\/old.devon.nl\/en\/what-is-devsecops\" \/>\n<meta property=\"og:url\" content=\"https:\/\/old.devon.nl\/en\/what-is-devsecops\/\" \/>\n<meta property=\"og:site_name\" content=\"DevOn\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-02T08:17:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/old.devon.nl\/wp-content\/uploads\/2019\/03\/case-study-graph.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Case study: DevSecOps\" \/>\n<meta name=\"twitter:description\" content=\"Download the free DevSecOps case study: &quot;Implementing Security into DevOps&quot; op https:\/\/old.devon.nl\/en\/what-is-devsecops\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/old.devon.nl\/wp-content\/uploads\/2019\/03\/case-study-graph.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/old.devon.nl\/en\/what-is-devsecops\/\",\"url\":\"https:\/\/old.devon.nl\/en\/what-is-devsecops\/\",\"name\":\"What is DevSecOps - DevOn\",\"isPartOf\":{\"@id\":\"https:\/\/old.devon.nl\/#website\"},\"datePublished\":\"2019-02-20T13:54:45+00:00\",\"dateModified\":\"2025-07-02T08:17:12+00:00\",\"description\":\"From Code to Cloud\u2014Securely.Discover how DevOn helps teams integrate automated security into every step of the SDLC.\",\"breadcrumb\":{\"@id\":\"https:\/\/old.devon.nl\/en\/what-is-devsecops\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/old.devon.nl\/en\/what-is-devsecops\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/old.devon.nl\/en\/what-is-devsecops\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/old.devon.nl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is DevSecOps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/old.devon.nl\/#website\",\"url\":\"https:\/\/old.devon.nl\/\",\"name\":\"DevOn\",\"description\":\"Transforming organizations to disruptive digital enterprises.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/old.devon.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is DevSecOps - DevOn","description":"From Code to Cloud\u2014Securely.Discover how DevOn helps teams integrate automated security into every step of the SDLC.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Case study: DevSecOps","og_description":"Download the free DevSecOps case study: \"Implementing Security into DevOps\" op https:\/\/old.devon.nl\/en\/what-is-devsecops","og_url":"https:\/\/old.devon.nl\/en\/what-is-devsecops\/","og_site_name":"DevOn","article_modified_time":"2025-07-02T08:17:12+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/old.devon.nl\/wp-content\/uploads\/2019\/03\/case-study-graph.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Case study: DevSecOps","twitter_description":"Download the free DevSecOps case study: \"Implementing Security into DevOps\" op https:\/\/old.devon.nl\/en\/what-is-devsecops","twitter_image":"https:\/\/old.devon.nl\/wp-content\/uploads\/2019\/03\/case-study-graph.png","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/old.devon.nl\/en\/what-is-devsecops\/","url":"https:\/\/old.devon.nl\/en\/what-is-devsecops\/","name":"What is DevSecOps - DevOn","isPartOf":{"@id":"https:\/\/old.devon.nl\/#website"},"datePublished":"2019-02-20T13:54:45+00:00","dateModified":"2025-07-02T08:17:12+00:00","description":"From Code to Cloud\u2014Securely.Discover how DevOn helps teams integrate automated security into every step of the SDLC.","breadcrumb":{"@id":"https:\/\/old.devon.nl\/en\/what-is-devsecops\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/old.devon.nl\/en\/what-is-devsecops\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/old.devon.nl\/en\/what-is-devsecops\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/old.devon.nl\/en\/"},{"@type":"ListItem","position":2,"name":"What is DevSecOps"}]},{"@type":"WebSite","@id":"https:\/\/old.devon.nl\/#website","url":"https:\/\/old.devon.nl\/","name":"DevOn","description":"Transforming organizations to disruptive digital enterprises.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/old.devon.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/pages\/11910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/comments?post=11910"}],"version-history":[{"count":8,"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/pages\/11910\/revisions"}],"predecessor-version":[{"id":27240,"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/pages\/11910\/revisions\/27240"}],"wp:attachment":[{"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/media?parent=11910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}