Skip to main content

DevSecOps Introduction Strategy

What is DevSecOps?

It is a culture and methodology that integrates development (Dev), security (Sec), and operations (Ops) to internalize security throughout the software development life cycle. The key is to block threats early with automated inspection from the time code is written, rather than “security comes later.”


Shift Left — Why faster is better

The cost of fixing a vulnerability varies dozens of times depending on when it is discovered.

As vulnerabilities are discovered at the code writing stage, the cost and time to fix them decreases exponentially.

When discoveredrelative cost of correctionContact person
Writing code (IDE·pre-commit)1xDeveloper himself
PR/Code Review (CI)10xDeveloper/Reviewer
Staging·QA25xQA/DevOps
After production deployment100xAll Teams/Security Team

The goal of DevSecOps is to move as many checks to the left (code writing phase) as possible.


Maturity Model — Stage 4

stepslevelFeaturesMain tools
Step 1NoneSecurity check manual or absent
Step 2BasicKey Areas CI AutomationGitleaks, grype
Step 3SystematizationFull-area pipeline integrationSemgrep, Trivy, Checkov
Step 4OptimizationAutomatic calibration/continuous monitoringDependabot + AI

For most teams, it is realistic to start in Stage 2 and move to Stage 3 over 6 to 12 months.


Step-by-step introduction roadmap

Don’t try to introduce everything at once

Stabilizing one area at a time and then moving on to the next is a sustainable way to avoid team fatigue.

  1. Start Immediately (1-2 Weeks) Secret detection (Gitleaks) + SCA is applied starting from basic (grype). The setup is simple and the effects are immediate. Blocks secret leaks and critical vulnerabilities in the existing code base.

  2. Improvement of code quality (1 month) Add SAST(Semgrep). Choose a ruleset that matches the language your team uses, and initially print only a warning, then switch to block builds after 2-4 weeks.

  3. Build/Infrastructure Security (2~3 months) Add container security (Trivy) + IaC security (Checkov). Applies to teams that use container/cloud environments.

  4. Completion of dynamic analysis and automation (3-6 months) Add DAST(OWASP ZAP). After integrating all areas of the pipeline, a monitoring and automatic correction system is established.


Location in the pipeline

areapre-commitPR/CIbuildAfter Deployment
Secret Detection
SAST
SCA
Container Security
IaC security
DAST

Self-study — step-by-step agent

Automate each step with Claude Code agent

If you run the agents below in order, You can actually implement steps 1-4 on the strategy page.

Prerequisite: Requires clone of Trusted OSS repository

stepsagentcommand
Step 2 — Internalize the AI rulesai-coding-setupcd agents/ai-coding-setup && claude
Step 3 — CI/CD Pipelinedevsecops-setupcd agents/devsecops-setup && claude
Step 3 — PR Auto Commentlevel2-pr-commentcd agents/level2-automation/pr-comment && claude
Step 4 — Continuous monitoringlevel2-issue-trackercd agents/level2-automation/issue-tracker && claude

Next steps