{"id":2746,"date":"2018-06-13T16:44:37","date_gmt":"2018-06-13T16:44:37","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=541456"},"modified":"2018-06-13T16:44:37","modified_gmt":"2018-06-13T16:44:37","slug":"security-in-a-devops-world","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/","title":{"rendered":"Security In A DevOps World"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/66-300x169.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Security-focused Definition of DevOps\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/66-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/66-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/66-1024x576.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/66-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/66-900x506.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/66-440x248.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/66-380x214.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/66.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p class=\"p3\"><em><span class=\"s1\">[Originally presented at the Gartner Security &amp; Risk Management Summit 2018, \u201cSecurity In A DevOps World\u201d examines the challenges and benefits of integrating security technology and thinking into the development process at the early stages. <a href=\"https:\/\/blog.trendmicro.com\/data\/2018-06-gartner\/security-in-a-devops-world.pdf\">The slides<\/a> are designed to assist in the presentation of the material but they also might come in handy as a memory aid.]<\/span><\/em><\/p>\n<p><iframe loading=\"lazy\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/wtg3g2Vf1pE?feature=oembed\" frameborder=\"0\" allow=\"autoplay; encrypted-media\" allowfullscreen=\"\">[embedded content]<\/iframe><\/p>\n<h2 class=\"p4\"><strong>Problem<\/strong><\/h2>\n<p class=\"p3\"><span class=\"s1\">We\u2019re all caught up in the rapid response, recover, and repeat cycle of cybersecurity. We rarely step back and evaluate whether our current approach and organizational structures align with our desired outcome.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">I firmly believe that how we structure security within an organization and our general approach has reached the limits of it\u2019s effectiveness.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">It\u2019s time for radical change.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">That\u2019s not to say we sweep the table and start all over again. The current method is inefficient, doesn\u2019t scale, and is very costly. We can do better.<\/span><\/p>\n<h2 class=\"p4\"><strong>Cultural Change<\/strong><\/h2>\n<p class=\"p3\"><span class=\"s1\">Cultural change is hard. It\u2019s one of the hardest things an organization can undertake. It takes persistence and dedication. It\u2019s a difficult path to travel.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">But there are positive examples. The push from waterfall to agile development methodologies followed quickly by the cultural push to a \u201cDevOps\u201d mentality to name two.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Clear away the current hype around all things DevOps and it boils down to this succinct tweet by Sonia Gupta;<\/span><\/p>\n<blockquote class=\"twitter-tweet\" readability=\"9.4769230769231\">\n<p dir=\"ltr\" lang=\"en\">What is DevOps? It\u2019s two things, per <a href=\"https:\/\/twitter.com\/jsnover?ref_src=twsrc%5Etfw\">@jsnover<\/a>:<\/p>\n<p>1) Do work in small batches so you can learn.<br \/>2) Stop being a jerk to your coworkers.<\/p>\n<p>Wisdom.<a href=\"https:\/\/twitter.com\/hashtag\/MSBuild?src=hash&amp;ref_src=twsrc%5Etfw\">#MSBuild<\/a><\/p>\n<p>\u2014 Sonia Gupta (@soniagupta504) <a href=\"https:\/\/twitter.com\/soniagupta504\/status\/993624416348200961?ref_src=twsrc%5Etfw\">May 7, 2018<\/a><\/p>\n<\/blockquote>\n<p class=\"p3\"><span class=\"s1\">The goal is to break down organizational silos and shorten overall feedbacks. It turns out that these two adjustments can dramatically change how IT services are delivered.<\/span><\/p>\n<h2 class=\"p4\"><strong>The Goal of Security<\/strong><\/h2>\n<p class=\"p3\"><span class=\"s1\">In order to align security efforts with a cultural shift, we need to clearly understand the goal of security. There are a number of definitions, but for me, the goal of security is simple.<\/span><\/p>\n<div class=\"outerImageWrap\">\n<div class=\"imageBorder\">\n<div class=\"imageWrapper\"><img decoding=\"async\" class=\"responsiveImage\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/goal-of-cybersecurity.jpg\" alt=\"\" title=\"\"\/><\/div>\n<\/div>\n<\/div>\n<p class=\"p3\"><span class=\"s1\">Security works to ensure that your systems work as intended\u2026and only as intended.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">You cannot achieve this goal from within the cybersecurity team alone. It requires collaboration and cooperation with the rest of the organization.<\/span><\/p>\n<div class=\"outerImageWrap\">\n<div class=\"imageBorder\">\n<div class=\"imageWrapper\"><img decoding=\"async\" class=\"responsiveImage\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/cybersecurity-it-employee-ratio.jpg\" alt=\"\" title=\"\"\/><\/div>\n<\/div>\n<\/div>\n<p class=\"p3\"><span class=\"s1\">That\u2019s how we\u2019ll address the security skills gaps. Not by training more and more of what we currently think of as \u201csecurity people\u201d, but by raising the level of security knowledge throughout the organization.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">The DevOps movement represents the most significant opportunity for security implementation to align with desired outcomes in the past generation. That sounds dramatic but it\u2019s also accurate.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">We\u2014the security community\u2014owe it to ourselves and our organizations to take advantage of this opportunity.<\/span><\/p>\n<h2 class=\"p4\"><strong>Development Process<\/strong><\/h2>\n<p class=\"p3\"><span class=\"s1\">To tie security outcomes this cultural shift, security work must \u201cshift left\u201d. This refers to moving to the left side of the common development workflow visualization.<\/span><\/p>\n<div class=\"outerImageWrap\">\n<div class=\"imageBorder\">\n<div class=\"imageWrapper\"><img decoding=\"async\" class=\"responsiveImage\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/development-process.jpg\" alt=\"\" title=\"\"\/><\/div>\n<\/div>\n<\/div>\n<p class=\"p3\"><span class=\"s1\">Moving to the left side of the diagram where all of the \u201cdevelopment\u201d is done will increase the effectiveness of security efforts while simultaneously reducing their overall cost.<\/span><\/p>\n<div class=\"outerImageWrap\">\n<div class=\"imageBorder\">\n<div class=\"imageWrapper\"><img decoding=\"async\" class=\"responsiveImage\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/resolution-cost.jpg\" alt=\"\" title=\"\"\/><\/div>\n<\/div>\n<\/div>\n<p class=\"p3\"><span class=\"s1\">Starting with the planning phase, security knowledge helps developers and other teams make smarter design decisions. Creating systems that have deeply integrated security and respect privacy by design is the most effective way to increase our overall security posture.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">No one wants to write poor quality, vulnerable software. But by bolting on security at the end, we continue to enable this outcome.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Making smart design decisions like encrypting by default, using well maintained and accepted sanitization libraries, and reducing the amount of personal information stored means that mistakes have a smaller chance of exposing valuable information.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">In the coding phrase, security thinking helps ensure that test coverage is adequate for the data being processed. It helps developers use secure, well-understood patterns for secrets management, and other resilient coding practices.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">During the testing phase, security tools can help reduce the risk of 3rd party dependencies by identifying known issues and implementing unit tests for core security controls.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Finally in the staging phase, all of the information about the latest iteration of the development cycle can be used to inform the security controls in production. This ensures that production controls are aware of the most recent changes in the application, and overall, the monitoring systems have a much clearer idea of what \u201cnormal\u201d behaviour for the application looks like.<\/span><\/p>\n<h2 class=\"p4\"><strong>What\u2019s Next<\/strong><\/h2>\n<p class=\"p3\"><span class=\"s1\">Creating a culture of security thinking is a huge undertaking. The current approach of an isolated team trying to coordinate and collaborate with the rest of the organization has reached it\u2019s scaling limit.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">It\u2019s time for a shift.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">We\u2014the security community\u2014are fortunate that the shift to a DevOps culture is getting started. This presents a unique opportunity to piggyback on this effort and combine forces.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">We can use the momentum generated by the push to DevOps to do security right. We can integrate security into the fabric of service delivery and ensure that our systems work as intended\u2026and only as intended.<\/span><\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/security-in-a-devops-world\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[Originally presented at the Gartner Security &#38; Risk Management Summit 2018, &#8220;Security In A DevOps World&#8221; examines the challenges and benefits of integrating security technology and thinking into the development process at the early stages. The slides are designed to assist in the presentation of the material but they also might come in handy as&#8230;<br \/>\nThe post Security In A DevOps World appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":2747,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[127,1252,1253,307],"class_list":["post-2746","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-aws","tag-cloud","tag-cloud-computing","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security In A DevOps World 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security In A DevOps World 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-13T16:44:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/security-in-a-devops-world.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"169\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-in-a-devops-world\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-in-a-devops-world\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Security In A DevOps World\",\"datePublished\":\"2018-06-13T16:44:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-in-a-devops-world\\\/\"},\"wordCount\":830,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-in-a-devops-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/security-in-a-devops-world.jpg\",\"keywords\":[\"AWS\",\"cloud\",\"cloud computing\",\"Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-in-a-devops-world\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-in-a-devops-world\\\/\",\"name\":\"Security In A DevOps World 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-in-a-devops-world\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-in-a-devops-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/security-in-a-devops-world.jpg\",\"datePublished\":\"2018-06-13T16:44:37+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-in-a-devops-world\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-in-a-devops-world\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-in-a-devops-world\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/security-in-a-devops-world.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/security-in-a-devops-world.jpg\",\"width\":300,\"height\":169},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-in-a-devops-world\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AWS\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/aws\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security In A DevOps World\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security In A DevOps World 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/","og_locale":"en_US","og_type":"article","og_title":"Security In A DevOps World 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-13T16:44:37+00:00","og_image":[{"width":300,"height":169,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/security-in-a-devops-world.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Security In A DevOps World","datePublished":"2018-06-13T16:44:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/"},"wordCount":830,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/security-in-a-devops-world.jpg","keywords":["AWS","cloud","cloud computing","Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/","url":"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/","name":"Security In A DevOps World 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/security-in-a-devops-world.jpg","datePublished":"2018-06-13T16:44:37+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/security-in-a-devops-world.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/security-in-a-devops-world.jpg","width":300,"height":169},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/security-in-a-devops-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"AWS","item":"https:\/\/www.threatshub.org\/blog\/tag\/aws\/"},{"@type":"ListItem","position":3,"name":"Security In A DevOps World"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=2746"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2746\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/2747"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=2746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=2746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=2746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}