Organizations often struggle in applying DevSecOps practices and principles, particularly in heavily regulated and cybersecurity-constrained environments, because they lack a consistent basis for managing software-intensive development, cybersecurity, and operations in a high-speed lifecycle. These organizations need an authoritative reference in order to fully design and execute an integrated DevSecOps strategy in which all stakeholder needs are addressed. The SEI developed the DevSecOps Platform Independent Model (PIM) to enable organizations to implement DevSecOps in a secure, safe, and sustainable way in order to fully reap the benefits of flexibility and speed available from implementing DevSecOps principles, practices, and tools.
DevSecOps is not simply a technology, a pipeline, or a system. It is an entire socio-technical environment that encompasses the people in certain roles, the processes that they are fulfilling, and the technology used to provide a capability that results in a relevant product or service being provided to meet a need. Because of this, there is no one-size-fits-all one-and-done pipeline. Each DevSecOps pipeline must be tailored to fulfill the needs of a particular program and must evolve as the needs of the organization change.
While there are many theories and tools for DevSecOps, there is no practical framework for its implementation and evaluation. Filling this gap is especially critical for major Department of Defense programs because they rely on the DevSecOps pipeline to repeatedly perform key assurance activities to address the scale and complexity of their software systems. While large organizations have successfully implemented some aspects of DevSecOps on smaller initiatives, they can struggle to implement these same techniques on large-scale projects.
The DevSecOps Platform Independent Model was developed to outline the activities necessary to consciously and predictably evolve the pipeline, while providing a formal approach and methodology to building a secure pipeline tailored to an organization’s specific requirements. The model is especially useful to government agencies and heavily regulated or constrained segments of industry, such as banking and healthcare, where implementing DevSecOps at scale can be challenging.
The DevSecOps PIM includes ten capability areas covering every stage of the DevSecOps lifecycle. The team mapped requirements to capabilities and defined four capability levels to qualitatively evaluate DevSecOps capabilities from planning to software assurance. In addition to capabilities, the model defines the roles and responsibilities for different positions within the organization with goals and measurements to fully encompass the socio-technical aspects of the pipeline.
The model also maps out process flows required in building a secure and resilient DevSecOps pipeline, outlining the different data elements that impact the pipeline, building in security, and applying a measurement framework to allow model users to quantify the health of their DevSecOps pipeline through the development and operational lifecycles—all while reducing time to deployment.
The DevSecOps PIM provides
The DevSecOps PIM enables organizations, projects, teams, and acquirers to
The DevSecOps PIM enables organizations to implement DevSecOps in a secure, safe, and sustainable way.
Learn MoreThis blog post presents a DevSecOps Platform-Independent Model that uses model based system engineering constructs to formalize the practices of DevSecOps pipelines and organize guidance.
READ