The Top Tools to Support DevSecOps - Part 5
May 31, 2018

DEVOPSdigest asked experts from across the IT industry — from analysts and consultants to users and the top vendors — for their opinions on the top tools to support DevSecOps. Part 5, the last installment, offers some final thoughts about "tools" that are not necessarily technology.

Start with The Top Tools to Support DevSecOps - Part 1

Start with The Top Tools to Support DevSecOps - Part 2

Start with The Top Tools to Support DevSecOps - Part 3

Start with The Top Tools to Support DevSecOps - Part 4


Investment in quality people is the single best investment in tooling an organization can make to support DevSecOps. From the executives that need to make the command decisions that weigh risk versus business goal, to the developers writing the applications, to the security teams that are trying to implement "Security at the Speed of Code." Without an investment in quality people, you end up with a hamstrung environment where even the most modest security practices are overlooked in favor of doing what is "easy" or "nimble." The "fail fast" mantra of DevOps should not be applied to a security program wherein the consumer bears all the weight of an unfortunate event.
John Stauffacher
Director - Offensive Security, Trace3


Your most important tool needed for DevSecOps isn't a actually tool, or even a process: it's culture. You can influence culture — having support from the top is vital — but you can't prescribe it. Instead, you'll need to build a multi-disciplinary team of enthusiasts: not just security experts, but auditors, docs, ops and testing people and beyond. You'll help them through failures and successes, and then encourage them to spread the word across your organization: they become your most important tool for success.
Mike Bursell
Chief Security Architect, Red Hat

DevSecOps is a culture and hence implementing it is mainly a mindset change. The tools will only drive the change, but the most important part is to go from having separate teams with siloed responsibilities in the software development lifecycle to having teams that are fully responsible for implementing, testing and running their code in production.
Isa Vilacides
Quality Engineering Manager, CloudBees


Probably the most critical tool when trying to bring security colleagues along on your DevOps transformation is a whiteboard and a stack of post-it notes. Fundamentally the collaboration will rise or fall based on how well people from different teams and with different skills work together. Getting everyone physically together upfront, taking people away from how things work day-to-day, and holding a well organized and well run set of workshops is a great first step on your DevOps journey.
Gareth Rushgrove
Product Manager, Docker


Simply putting developers and security people into the same cube farm and telling them to work together won't work, of course — and will likely be counterproductive. Collaboration is key — but even the best collaboration tool in the world won't facilitate cooperation among people who feel they are in an adversarial relationship with each other. Just as with DevOps itself, therefore, the most important tool for DevSecOps is empathy — the ability to put yourself into the other person's shoes and see the problem space from their point of view. Once the team has sufficient empathy for each other, collaboration tooling is important to be sure — but tools don't make high-performance teams.
Jason Bloomberg
President, Intellyx

The Latest

August 15, 2018

Microservices are a hot topic in IT circles these days. The idea of a modular approach to system building – where you have numerous, smaller software services that talk to each other instead of monolithic components – has many benefits ...

August 13, 2018

Agile is expanding within the enterprise. Agile adoption is growing within organizations, both more broadly and deeply, according to the 12th annual State of Agile report from CollabNet VersionOne. A higher percentage of respondents this year report that "all or almost all" of their teams are agile, and that agile principles and practices are being adopted at higher levels in the organization ...

August 09, 2018

For the past 13 years, the Ponemon Institute has examined the cost associated with data breaches of less than 100,000 records, finding that the costs have steadily risen over the course of the study. The average cost of a data breach was $3.86 million in the 2018 study, compared to $3.50 million in 2014 – representing nearly 10 percent net increase over the past 5 years of the study ...

August 08, 2018

Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage, according to the 2018 Cost of a Data Breach Study, sponsored by IBM Security and conducted by Ponemon Institute. The study found that the average cost of a data breach globally is $3.86 million ...

August 06, 2018

The previous chapter in this WhiteHat Security series discussed dependencies as the second step of the Twelve-Factor App. This next chapter examines the security component of step three of the Twelve-Factor methodology — storing configurations within the environment.

Share this