Listen "Does your DevSecOps Pipeline only Function as Intended?"
Episode Synopsis
Understanding and articulating cybersecurity risk is hard. With the adoption of DevSecOps tools and techniques and the increased coupling between the product being built and the tools used to build them, the attack surface of the product continues to grow by incorporating segments of the development environment. Thus, many enterprises are concerned that DevSecOps pipeline weaknesses can be abused to inject exploitable vulnerabilities into their products and services. Using Model Based Systems Engineering (MBSE), a DevSecOps model can be built that considers system assurance and enables organizations to design and execute a fully integrated DevSecOps strategy in which stakeholder needs are addressed with cybersecurity in all aspects of the DevSecOps pipeline. An assurance case can be used to show the adequacy of the model for both the pipeline and the embedded or distributed system. While builders of embedded and distributed systems want to achieve the flexibility and speed expected when applying DevSecOps, reference material and a repeatable defensible process are needed to confirm that a given DevSecOps pipeline is implemented in a secure, safe, and sustainable way. What Attendees will Learn: an approach to evaluate and mitigate the risk associated with attackers exploiting DevSecOps pipeline weaknesses and vulnerabilities how to structure an assurance case around the core capabilities of a DevSecOps pipeline
More episodes of the podcast Software Engineering Institute (SEI) Webcast Series
5 Essential Questions for Implementing the Software Acquisition Pathway and the Tools to Tackle Them
23/10/2025
Q-Day Countdown: Are You Prepared?
15/10/2025
Using LLMs to Evaluate Code
02/10/2025
Identifying AI Talent for the DoD Workforce
18/07/2025
Model Your Way to Better Cybersecurity
10/07/2025
DevSecOps: See, Use, Succeed
27/06/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.