[{"data":1,"prerenderedAt":463},["ShallowReactive",2],{"/en-us/the-source/authors/ncregan/":3,"footer-en-us":31,"the-source-banner-en-us":338,"the-source-navigation-en-us":350,"the-source-newsletter-en-us":378,"ncregan-articles-list-authors-en-us":389,"ncregan-articles-list-en-us":420,"ncregan-page-categories-en-us":462},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"config":8,"seo":10,"content":12,"type":23,"slug":17,"_id":24,"_type":25,"title":26,"_source":27,"_file":28,"_stem":29,"_extension":30},"/en-us/the-source/authors/ncregan","authors",false,"",{"layout":9},"the-source",{"title":11},"Niall Cregan",[13,21],{"componentName":14,"type":14,"componentContent":15},"TheSourceAuthorHero",{"config":16,"name":11,"headshot":18},{"gitlabHandle":17},"ncregan",{"altText":11,"config":19},{"src":20},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463431/yrtwodocb4cu3j7lkhyo.png",{"componentName":22,"type":22},"TheSourceArticlesList","author","content:en-us:the-source:authors:ncregan.yml","yaml","Ncregan","content","en-us/the-source/authors/ncregan.yml","en-us/the-source/authors/ncregan","yml",{"_path":32,"_dir":33,"_draft":6,"_partial":6,"_locale":7,"data":34,"_id":334,"_type":25,"title":335,"_source":27,"_file":336,"_stem":337,"_extension":30},"/shared/en-us/main-footer","en-us",{"text":35,"source":36,"edit":42,"contribute":47,"config":52,"items":57,"minimal":326},"Git is a trademark of Software Freedom Conservancy and our use of 'GitLab' is under license",{"text":37,"config":38},"View page source",{"href":39,"dataGaName":40,"dataGaLocation":41},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":43,"config":44},"Edit this page",{"href":45,"dataGaName":46,"dataGaLocation":41},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":48,"config":49},"Please contribute",{"href":50,"dataGaName":51,"dataGaLocation":41},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":53,"facebook":54,"youtube":55,"linkedin":56},"https://twitter.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[58,85,157,225,287],{"title":59,"links":60,"subMenu":66},"Platform",[61],{"text":62,"config":63},"DevSecOps platform",{"href":64,"dataGaName":65,"dataGaLocation":41},"/platform/","devsecops platform",[67],{"title":68,"links":69},"Pricing",[70,75,80],{"text":71,"config":72},"View plans",{"href":73,"dataGaName":74,"dataGaLocation":41},"/pricing/","view plans",{"text":76,"config":77},"Why Premium?",{"href":78,"dataGaName":79,"dataGaLocation":41},"/pricing/premium/","why premium",{"text":81,"config":82},"Why Ultimate?",{"href":83,"dataGaName":84,"dataGaLocation":41},"/pricing/ultimate/","why ultimate",{"title":86,"links":87},"Solutions",[88,93,97,102,107,112,117,122,127,132,137,142,147,152],{"text":89,"config":90},"Digital transformation",{"href":91,"dataGaName":92,"dataGaLocation":41},"/topics/digital-transformation/","digital transformation",{"text":94,"config":95},"Application Security Testing",{"href":96,"dataGaName":94,"dataGaLocation":41},"/solutions/application-security-testing/",{"text":98,"config":99},"Automated software delivery",{"href":100,"dataGaName":101,"dataGaLocation":41},"/solutions/delivery-automation/","automated software delivery",{"text":103,"config":104},"Agile development",{"href":105,"dataGaName":106,"dataGaLocation":41},"/solutions/agile-delivery/","agile delivery",{"text":108,"config":109},"Cloud transformation",{"href":110,"dataGaName":111,"dataGaLocation":41},"/topics/cloud-native/","cloud transformation",{"text":113,"config":114},"SCM",{"href":115,"dataGaName":116,"dataGaLocation":41},"/solutions/source-code-management/","source code management",{"text":118,"config":119},"CI/CD",{"href":120,"dataGaName":121,"dataGaLocation":41},"/solutions/continuous-integration/","continuous integration & delivery",{"text":123,"config":124},"Value stream management",{"href":125,"dataGaName":126,"dataGaLocation":41},"/solutions/value-stream-management/","value stream management",{"text":128,"config":129},"GitOps",{"href":130,"dataGaName":131,"dataGaLocation":41},"/solutions/gitops/","gitops",{"text":133,"config":134},"Enterprise",{"href":135,"dataGaName":136,"dataGaLocation":41},"/enterprise/","enterprise",{"text":138,"config":139},"Small business",{"href":140,"dataGaName":141,"dataGaLocation":41},"/small-business/","small business",{"text":143,"config":144},"Public sector",{"href":145,"dataGaName":146,"dataGaLocation":41},"/solutions/public-sector/","public sector",{"text":148,"config":149},"Education",{"href":150,"dataGaName":151,"dataGaLocation":41},"/solutions/education/","education",{"text":153,"config":154},"Financial services",{"href":155,"dataGaName":156,"dataGaLocation":41},"/solutions/finance/","financial services",{"title":158,"links":159},"Resources",[160,165,170,175,180,185,190,195,200,205,210,215,220],{"text":161,"config":162},"Install",{"href":163,"dataGaName":164,"dataGaLocation":41},"/install/","install",{"text":166,"config":167},"Quick start guides",{"href":168,"dataGaName":169,"dataGaLocation":41},"/get-started/","quick setup checklists",{"text":171,"config":172},"Learn",{"href":173,"dataGaName":174,"dataGaLocation":41},"https://university.gitlab.com/","learn",{"text":176,"config":177},"Product documentation",{"href":178,"dataGaName":179,"dataGaLocation":41},"https://docs.gitlab.com/","docs",{"text":181,"config":182},"Blog",{"href":183,"dataGaName":184,"dataGaLocation":41},"/blog/","blog",{"text":186,"config":187},"Customer success stories",{"href":188,"dataGaName":189,"dataGaLocation":41},"/customers/","customer success stories",{"text":191,"config":192},"Remote",{"href":193,"dataGaName":194,"dataGaLocation":41},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":196,"config":197},"GitLab Services",{"href":198,"dataGaName":199,"dataGaLocation":41},"/services/","services",{"text":201,"config":202},"TeamOps",{"href":203,"dataGaName":204,"dataGaLocation":41},"/teamops/","teamops",{"text":206,"config":207},"Community",{"href":208,"dataGaName":209,"dataGaLocation":41},"/community/","community",{"text":211,"config":212},"Forum",{"href":213,"dataGaName":214,"dataGaLocation":41},"https://forum.gitlab.com/","forum",{"text":216,"config":217},"Events",{"href":218,"dataGaName":219,"dataGaLocation":41},"/events/","events",{"text":221,"config":222},"Partners",{"href":223,"dataGaName":224,"dataGaLocation":41},"/partners/","partners",{"title":226,"links":227},"Company",[228,233,238,243,248,253,258,262,267,272,277,282],{"text":229,"config":230},"About",{"href":231,"dataGaName":232,"dataGaLocation":41},"/company/","company",{"text":234,"config":235},"Jobs",{"href":236,"dataGaName":237,"dataGaLocation":41},"/jobs/","jobs",{"text":239,"config":240},"Leadership",{"href":241,"dataGaName":242,"dataGaLocation":41},"/company/team/e-group/","leadership",{"text":244,"config":245},"Team",{"href":246,"dataGaName":247,"dataGaLocation":41},"/company/team/","team",{"text":249,"config":250},"Handbook",{"href":251,"dataGaName":252,"dataGaLocation":41},"https://handbook.gitlab.com/","handbook",{"text":254,"config":255},"Investor relations",{"href":256,"dataGaName":257,"dataGaLocation":41},"https://ir.gitlab.com/","investor relations",{"text":259,"config":260},"Sustainability",{"href":261,"dataGaName":259,"dataGaLocation":41},"/sustainability/",{"text":263,"config":264},"Diversity, inclusion and belonging (DIB)",{"href":265,"dataGaName":266,"dataGaLocation":41},"/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":268,"config":269},"Trust Center",{"href":270,"dataGaName":271,"dataGaLocation":41},"/security/","trust center",{"text":273,"config":274},"Newsletter",{"href":275,"dataGaName":276,"dataGaLocation":41},"/company/contact/","newsletter",{"text":278,"config":279},"Press",{"href":280,"dataGaName":281,"dataGaLocation":41},"/press/","press",{"text":283,"config":284},"Modern Slavery Transparency Statement",{"href":285,"dataGaName":286,"dataGaLocation":41},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"title":288,"links":289},"Contact Us",[290,295,300,305,310,315,320],{"text":291,"config":292},"Contact an expert",{"href":293,"dataGaName":294,"dataGaLocation":41},"/sales/","sales",{"text":296,"config":297},"Get help",{"href":298,"dataGaName":299,"dataGaLocation":41},"/support/","get help",{"text":301,"config":302},"Customer portal",{"href":303,"dataGaName":304,"dataGaLocation":41},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"text":306,"config":307},"Status",{"href":308,"dataGaName":309,"dataGaLocation":41},"https://status.gitlab.com/","status",{"text":311,"config":312},"Terms of use",{"href":313,"dataGaName":314,"dataGaLocation":41},"/terms/","terms of use",{"text":316,"config":317},"Privacy statement",{"href":318,"dataGaName":319,"dataGaLocation":41},"/privacy/","privacy statement",{"text":321,"config":322},"Cookie preferences",{"dataGaName":323,"dataGaLocation":41,"id":324,"isOneTrustButton":325},"cookie preferences","ot-sdk-btn",true,{"items":327},[328,330,332],{"text":311,"config":329},{"href":313,"dataGaName":314,"dataGaLocation":41},{"text":316,"config":331},{"href":318,"dataGaName":319,"dataGaLocation":41},{"text":321,"config":333},{"dataGaName":323,"dataGaLocation":41,"id":324,"isOneTrustButton":325},"content:shared:en-us:main-footer.yml","Main Footer","shared/en-us/main-footer.yml","shared/en-us/main-footer",{"_path":339,"_dir":340,"_draft":6,"_partial":6,"_locale":7,"visibility":325,"id":341,"title":342,"button":343,"_id":347,"_type":25,"_source":27,"_file":348,"_stem":349,"_extension":30},"/shared/en-us/the-source/banner/the-economics-of-software-innovation-2025-08-18","banner","The Economics of Software Innovation","The Economics of Software Innovation—AI’s $750 Billion Opportunity",{"config":344,"text":346},{"href":345},"https://about.gitlab.com/software-innovation-report/","Get the research report","content:shared:en-us:the-source:banner:the-economics-of-software-innovation-2025-08-18.yml","shared/en-us/the-source/banner/the-economics-of-software-innovation-2025-08-18.yml","shared/en-us/the-source/banner/the-economics-of-software-innovation-2025-08-18",{"_path":351,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"logo":352,"subscribeLink":357,"navItems":361,"_id":374,"_type":25,"title":375,"_source":27,"_file":376,"_stem":377,"_extension":30},"/shared/en-us/the-source/navigation",{"altText":353,"config":354},"the source logo",{"src":355,"href":356},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1750191004/t7wz1klfb2kxkezksv9t.svg","/the-source/",{"text":358,"config":359},"Subscribe",{"href":360},"#subscribe",[362,366,370],{"text":363,"config":364},"Artificial Intelligence",{"href":365},"/the-source/ai/",{"text":367,"config":368},"Security & Compliance",{"href":369},"/the-source/security/",{"text":371,"config":372},"Platform & Infrastructure",{"href":373},"/the-source/platform/","content:shared:en-us:the-source:navigation.yml","Navigation","shared/en-us/the-source/navigation.yml","shared/en-us/the-source/navigation",{"_path":379,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"title":380,"description":381,"submitMessage":382,"formData":383,"_id":386,"_type":25,"_source":27,"_file":387,"_stem":388,"_extension":30},"/shared/en-us/the-source/newsletter","The Source Newsletter","Stay updated with insights for the future of software development.","You have successfully signed up for The Source’s newsletter.",{"config":384},{"formId":385,"formName":276,"hideRequiredLabel":325},1077,"content:shared:en-us:the-source:newsletter.yml","shared/en-us/the-source/newsletter.yml","shared/en-us/the-source/newsletter",{"amanda-rueda":390,"andre-michael-braun":391,"andrew-haschka":392,"ayoub-fandi":393,"bob-stevens":394,"brian-wald":395,"bryan-ross":396,"chandler-gibbons":397,"dave-steer":398,"ddesanto":399,"derek-debellis":400,"emilio-salvador":401,"erika-feldman":402,"george-kichukov":403,"gitlab":404,"grant-hickman":405,"haim-snir":406,"iganbaruch":407,"jlongo":408,"joel-krooswyk":409,"josh-lemos":410,"julie-griffin":411,"kristina-weis":412,"lee-faus":413,"ncregan":11,"rschulman":414,"sabrina-farmer":415,"sandra-gittlen":416,"sharon-gaudin":417,"stephen-walters":418,"taylor-mccaslin":419},"Amanda Rueda","Andre Michael Braun","Andrew Haschka","Ayoub Fandi","Bob Stevens","Brian Wald","Bryan Ross","Chandler Gibbons","Dave Steer","David DeSanto","Derek DeBellis","Emilio Salvador","Erika Feldman","George Kichukov","GitLab","Grant Hickman","Haim Snir","Itzik Gan Baruch","Joseph Longo","Joel Krooswyk","Josh Lemos","Julie Griffin","Kristina Weis","Lee Faus","Robin Schulman","Sabrina Farmer","Sandra Gittlen","Sharon Gaudin","Stephen Walters","Taylor McCaslin",{"allArticles":421,"visibleArticles":461,"showAllBtn":325},[422],{"_path":423,"_dir":424,"_draft":6,"_partial":6,"_locale":7,"config":425,"seo":428,"content":432,"type":456,"slug":457,"category":424,"_id":458,"_type":25,"title":429,"_source":27,"_file":459,"_stem":460,"_extension":30,"date":433,"description":430,"timeToRead":434,"heroImage":431,"keyTakeaways":435,"articleBody":439,"faq":440},"/en-us/the-source/security/how-to-strengthen-security-by-applying-devsecops-principles","security",{"layout":9,"template":426,"articleType":427,"author":17,"featured":6,"isHighlighted":6,"authorName":11},"TheSourceArticle","Regular",{"title":429,"description":430,"ogImage":431},"How to strengthen security by applying DevSecOps principles","Learn how to apply DevSecOps principles today and discover the power of DevSecOps.","https://res.cloudinary.com/about-gitlab-com/image/upload/v1751464433/bdwagz0bt5bpgghjkout.png",{"title":429,"date":433,"description":430,"timeToRead":434,"heroImage":431,"keyTakeaways":435,"articleBody":439,"faq":440},"2023-02-23","4 min read",[436,437,438],"DevSecOps integrates security into the software development lifecycle, helping to reduce security issues without delaying delivery.","Automation in DevSecOps boosts security, streamlining threat detection and response.","Collaboration in DevSecOps shares the responsibility for security and fosters a unified approach to secure, rapid software development.","By following the DevSecOps principles, companies can ensure their applications are safe from malicious actors while delivering value quickly and efficiently. In this article, we'll take an in-depth look at DevSecOps principles and how they can help organizations stay ahead of the curve in terms of security. Let’s dive in.\n\n## What is DevSecOps?\n[DevSecOps](/topics/devsecops/) is an approach to software development that combines DevOps practices with security. This integration of security practices enables teams to create a secure and reliable product while delivering value quickly and efficiently. The successful execution of DevSecOps involves continuous integration, automation, and testing with the goal of accelerating time-to-market without sacrificing quality or security.\n\n## DevSecOps principles: An overview\n[DevSecOps principles](/blog/4-must-know-devops-principles/) enable a development team to build secure and dependable applications at speed through the execution of ingrained security testing and vulnerability scanning. By executing a DevSecOps approach, teams integrate security into the software development lifecycle (SDLC) from the initial design to continuous delivery and deployment. Doing so helps to prevent malicious actors from creating security issues by exploiting system vulnerabilities and reducing the overall risk of cyber attacks.\n\nDevSecOps principles include:\n\n### Automation and integration\nAutomation and integration are core principles of DevSecOps. The automation of security processes eliminates manual processes and assists in the development of secure and dependable applications while reducing the risk of future malicious attacks. You can set up and run security measures at multiple points during the development cycle to simplify and maximize security practices through the application of continuous security.\n\n### Continuous delivery and deployment\nContinuous delivery and deployment is another process that allows teams to respond to potential threats quickly and protect their software supply chain from malicious actors. [Continuously deploying applications using automated processes](/blog/cd-solution-overview/) makes it possible to rapidly develop new features and products while ensuring application security and quality.\n\n### A collaborative approach to security\nSecurity is a fundamental part of DevSecOps. Ensuring that applications remain secure and reliable requires [a highly collaborative approach](/topics/version-control/software-team-collaboration/) with ongoing and multiple security checks. It is necessary for all stakeholders involved in the development process to be engaged in the security process.\n\nSecurity teams must work with developers to ensure that applications are designed with [appropriate security controls](/topics/devsecops/devsecops-security-checklist/) and minimum security vulnerabilities. Simultaneously, for applications to get deployed and monitored securely, operations need to collaborate with security teams. This cross-functional collaboration ensures that all phases of the SDLC are interwoven with security best practices, resulting in a more resilient codebase.\n\n### Security at every stage of the SDLC\nEmploying security at every stage of the SDLC ensures the efficient development of secure applications without sacrificing quality. It is essential to cover  [every stage of the lifecycle](/blog/top-10-gitlab-hacks/) from design to development, and deployment.\n\nFor the process to be effective, developers must design applications with appropriate security controls, and operations teams should deploy and monitor them securely.\n\n### Proactive monitoring and response strategies\nProactive monitoring and response strategies are essential for maintaining the security of applications throughout their lifespan. [Monitoring](/blog/working-with-performance-metrics/) is achieved through the deployment of automated tools that identify potential vulnerabilities and alert teams when they arise.\n\nDoing so helps to minimize risk and ensure consistency across the organization. The employment of a comprehensive response strategy allows for issues to be identified and solved before they compound into security risks.\n\n## Benefits of implementing DevSecOps\nImplementing DevSecOps offers numerous benefits to organizations:\n1. It helps create trust with customers by providing more secure software.\n2. It prevents malicious actors from exploiting system vulnerabilities and improves the security of systems.\n3. The DevSecOps methodology enables teams to deliver value quickly while ensuring the highest levels of security and adherence to compliance requirements.\n4. By integrating security practices into the software development pipeline from design to deployment, teams can identify and address potential risks promptly, thus reducing the risk of malicious attacks.\n5. DevSecOps helps organizations stay ahead of potential threats and remain competitive in their markets.\n\n[Implementing DevSecOps](/blog/whats-next-for-devsecops/) is essential for any organization looking to protect its systems from malicious attacks while delivering value quickly and efficiently. Additionally, integrating security into the entire software development lifecycle ensures that all new applications are secure from the very beginning. Instilling a DevSecOps culture and approach maximizes the overall efficiency and quality of the software development process.",[441,444,447,450,453],{"header":442,"content":443},"What are the benefits of implementing DevSecOps for organizations?","Key benefits include:\n- Enhanced security by preventing vulnerabilities from entering the codebase\n- Faster time-to-market with secure, continuous delivery pipelines\n- Improved compliance with regulatory standards through automated security checks\n- Increased customer trust and confidence due to more secure software products\n- Reduced risk of cyberattacks by proactively identifying and mitigating security threats",{"header":445,"content":446},"How can organizations successfully implement DevSecOps principles?","Organizations can successfully implement DevSecOps by:\n- Automating security checks within CI/CD pipelines\n- Promoting a collaborative culture where security is a shared responsibility among developers, operations, and security teams\n- Training development teams on secure coding practices\n- Integrating proactive monitoring and incident response strategies to address security threats swiftly\n- Using comprehensive DevSecOps platforms like GitLab that provide built-in security tools, vulnerability scanning, and compliance monitoring",{"header":448,"content":449},"What is DevSecOps and how does it differ from traditional DevOps?","DevSecOps is an approach that integrates security practices into every phase of the software development lifecycle (SDLC). Unlike traditional DevOps, which focuses on continuous integration and delivery, DevSecOps embeds security checks, vulnerability scanning, and compliance controls throughout the development and deployment processes, ensuring secure and reliable applications.",{"header":451,"content":452},"What are the core principles of DevSecOps?","Core principles of DevSecOps include:\n- __Automation and integration__: Automating security checks and vulnerability scans throughout the CI/CD pipeline to minimize human error and accelerate secure deployments.\n- __Continuous delivery and deployment__: Ensuring rapid development and deployment of secure applications with automated security validations.\n- __Collaboration across teams__: Fostering cross-functional collaboration between development, security, and operations teams for integrated security practices.\n- __Security at every stage__: Embedding security controls from design to deployment to ensure comprehensive protection.\n- __Proactive monitoring and response__: Implementing continuous monitoring and response strategies to identify and mitigate risks promptly.",{"header":454,"content":455},"How does DevSecOps improve security without slowing down development?","DevSecOps automates security checks and integrates them into the CI/CD pipeline, allowing security validations to occur alongside development and testing. This approach minimizes manual security interventions, reducing bottlenecks and enabling rapid, secure deployments without compromising speed or agility.","article","how-to-strengthen-security-by-applying-devsecops-principles","content:en-us:the-source:security:how-to-strengthen-security-by-applying-devsecops-principles:index.yml","en-us/the-source/security/how-to-strengthen-security-by-applying-devsecops-principles/index.yml","en-us/the-source/security/how-to-strengthen-security-by-applying-devsecops-principles/index",[422],{"ai":363,"platform":371,"security":367},1758326282206]