← Back to Skills Library

DevSecOps

Information Technology > Continuous Integration/Continuous Deployment

Description

DevSecOps is a philosophy that integrates security practices within the DevOps process. It involves creating a 'Security as Code' culture with ongoing, flexible collaboration between release engineers and security teams. The main goal of DevSecOps is to make everyone accountable for security with the objective of implementing security decisions and actions at the same speed and scale as development and operations decisions and actions. This requires skills in secure coding, knowledge of automation and configuration management, understanding of cloud and network security, proficiency in scripting languages, and experience with security systems and tools. Ultimately, it's about bridging traditional gaps between IT and security while ensuring fast and safe code delivery.

Expected Behaviors

LEVEL 1

Fundamental Awareness

At the fundamental awareness level, individuals have a basic understanding of security concepts and DevOps principles. They are aware of common software vulnerabilities and secure coding practices. They also have a rudimentary understanding of cloud computing.

🌱
LEVEL 2

Novice

Novices can use basic security tools and have experience with a scripting language. They understand network protocols and can perform basic vulnerability assessments. They also have experience with version control systems.

🌍
LEVEL 3

Intermediate

At the intermediate level, individuals are proficient in a scripting language and have experience with automated testing tools. They can implement secure coding practices and understand encryption algorithms and protocols. They also have experience with containerization technologies.

LEVEL 4

Advanced

Advanced individuals can design secure architectures and have experience with advanced security tools. They are proficient in multiple scripting languages and can conduct comprehensive vulnerability assessments. They also have experience with continuous integration/continuous deployment (CI/CD) pipelines.

🏆
LEVEL 5

Expert

Experts excel in secure architecture design and are proficient in advanced security tools and techniques. They can develop custom scripts for automation and conduct comprehensive security audits. They also have a deep understanding of cloud security best practices.

Micro Skills

LEVEL 1

Fundamental Awareness

Understanding of confidentiality
Understanding of integrity
Understanding of availability
Understanding of malware
Understanding of network attacks
Understanding of social engineering attacks
Understanding of authentication mechanisms
Understanding of authorization mechanisms
Awareness of IaC benefits
Understanding of IaC tools
Understanding of CI/CD benefits
Understanding of CI/CD tools
🌱
LEVEL 2

Novice

Understanding of how to use antivirus software
Familiarity with basic firewall configuration
Knowledge of intrusion detection systems
Experience with password management tools
Basic knowledge of Python
Understanding of Bash scripting
Familiarity with JavaScript
Experience with PowerShell scripting
Knowledge of HTTP/HTTPS
Understanding of TCP/IP
Familiarity with DNS
Experience with FTP/SFTP
Understanding of vulnerability scanning tools
Knowledge of common vulnerabilities and exposures (CVE)
Experience with basic penetration testing
Familiarity with security assessment reports
Understanding of Git commands
Familiarity with branching and merging
Experience with pull requests
Knowledge of version control best practices
🌍
LEVEL 3

Intermediate

Understanding of syntax and semantics
Ability to write clean, efficient code
Knowledge of standard libraries and frameworks
Experience with debugging and error handling
Familiarity with testing and code review practices
Understanding of different types of testing (unit, integration, system)
Ability to write test cases and scripts
Experience with testing frameworks and libraries
Knowledge of continuous testing in CI/CD pipelines
Familiarity with test-driven development (TDD)
Understanding of common security vulnerabilities (OWASP Top 10)
Knowledge of secure design principles
Experience with static and dynamic analysis tools
Ability to remediate identified security issues
Familiarity with secure code review practices
Knowledge of symmetric and asymmetric encryption
Understanding of key management and certificate authorities
Familiarity with secure communication protocols (SSL/TLS)
Experience with implementing encryption in software
Understanding of hashing and digital signatures
Understanding of container concepts and architecture
Experience with Docker or similar technologies
Ability to create and manage containers
Knowledge of container orchestration (Kubernetes)
Understanding of container security best practices
LEVEL 4

Advanced

Understanding of secure design principles
Knowledge of threat modeling
Experience with security architecture frameworks
Ability to integrate security controls into system designs
Proficiency in using intrusion detection systems
Experience with advanced vulnerability scanners
Knowledge of data loss prevention tools
Ability to use encryption tools
Experience with Python for automation tasks
Proficiency in Bash for scripting on Unix/Linux systems
Knowledge of PowerShell for Windows environments
Experience with Ruby for scripting and automation
Experience with penetration testing tools
Knowledge of vulnerability assessment methodologies
Ability to interpret vulnerability assessment results
Experience with manual code review for security vulnerabilities
Understanding of CI/CD concepts
Experience with Jenkins for CI/CD
Knowledge of GitLab CI for continuous integration
Experience with Docker for containerization in CI/CD pipelines
🏆
LEVEL 5

Expert

Understanding of secure network design principles
Experience with secure cloud architecture design
Ability to design secure mobile architectures
Experience with advanced vulnerability scanning tools
Proficiency in intrusion detection systems
Experience with advanced encryption techniques
Proficiency in multiple scripting languages
Experience with script debugging
Understanding of script optimization techniques
Experience with internal and external audits
Ability to identify and mitigate risks
Experience with incident response planning
Experience with cloud access security brokers
Understanding of cloud data protection strategies
Knowledge of cloud-specific vulnerabilities

Skill Overview

  • Expert3 years experience
  • Micro-skills92
  • Roles requiring skill4

Sign up to prepare yourself or your team for a role that requires DevSecOps.

LoginSign Up