Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Power Of The Intl API: A Definitive Guide To Browser-Native Internationalization

      August 8, 2025

      This week in AI dev tools: GPT-5, Claude Opus 4.1, and more (August 8, 2025)

      August 8, 2025

      Elastic simplifies log analytics for SREs and developers with launch of Log Essentials

      August 7, 2025

      OpenAI launches GPT-5

      August 7, 2025

      3 portable power stations I travel everywhere with (and how they differ)

      August 9, 2025

      I tried Lenovo’s new rollable ThinkBook and can’t go back to regular-sized screens

      August 9, 2025

      The Creators of the Acclaimed Silent Hill 2 Remake Present a Deep Dive Into the Story of Their Newest Horror Game IP — and It’s So Bizarre and Insane That It’s Convinced Me To Put It on My Wishlist

      August 9, 2025

      Forget Back to School Deals — Lenovo’s Clearance Sale is Where You’ll Find Amazing Discounts on Laptops, Mini PCs, and More, While Supplies Last

      August 9, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      spatie/laravel-flare

      August 9, 2025
      Recent

      spatie/laravel-flare

      August 9, 2025

      Establishing Consistent Data Foundations with Laravel’s Database Population System

      August 8, 2025

      Generate Postman Collections from Laravel Routes

      August 8, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      The Creators of the Acclaimed Silent Hill 2 Remake Present a Deep Dive Into the Story of Their Newest Horror Game IP — and It’s So Bizarre and Insane That It’s Convinced Me To Put It on My Wishlist

      August 9, 2025
      Recent

      The Creators of the Acclaimed Silent Hill 2 Remake Present a Deep Dive Into the Story of Their Newest Horror Game IP — and It’s So Bizarre and Insane That It’s Convinced Me To Put It on My Wishlist

      August 9, 2025

      Forget Back to School Deals — Lenovo’s Clearance Sale is Where You’ll Find Amazing Discounts on Laptops, Mini PCs, and More, While Supplies Last

      August 9, 2025

      The Gaming Desktop I’ve Relied on More Than Any Other Is More Powerful and Sleeker Than Ever — But Damn, It’s Expensive

      August 9, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»End-to-End DevSecOps in CI/CD Pipelines: Build Secure Apps with Sast, Dast and Azure DevOps

    End-to-End DevSecOps in CI/CD Pipelines: Build Secure Apps with Sast, Dast and Azure DevOps

    August 6, 2025

    Introduction to DevSecOps

    DevSecOps is the evolution of DevOps with a focused integration of security throughout the software development lifecycle (SDLC). It promotes a cultural and technical shift by “shifting security left,”  integrating security early in the CI/CD pipeline instead of treating it as an afterthought.

    Dev Sec Ops Removebg Preview

    While DevOps engineers focus on speed, automation, and reliability, DevSecOps engineers share the same goals with an added responsibility: ensuring security at every stage of the process.

    DevSecOps = Development + Security + Operations

    By embedding security from the beginning, DevSecOps enables organizations to build secure software faster, reduce costs, and minimize risks.

    Why Shift Left with Security?

    Dollar Logo PNG Vectors Free Download

    Cost Savings

    Search Bug Icons - Free SVG & PNG Search Bug Images - Noun Project

    Early Detection

     

    Shifting security left means embedding security checks earlier in the pipeline. This approach offers several key benefits:

     

     

    • Early Detection: Identifies vulnerabilities before they reach production.
    • Cost Savings: Fixing security issues in earlier phases of development is significantly more cost-effective.

    • Reduced Risk: Early intervention helps prevent critical vulnerabilities from being deployed.

    Implementing DevSecOps in an Existing CI/CD Pipeline

    Prerequisites

    To implement DevSecOps in your Azure DevOps pipeline, ensure the following infrastructure is in place:

    • Azure VM (for self-hosted Azure DevOps agent)

    • Azure Kubernetes Service (AKS)

    • Azure Container Registry (ACR)

    • Azure DevOps project and repository

    • SonarQube (for static code analysis)Docker Registry Service Connection​

    Service Connections Setup

    1. Docker Registry Connection

    • Go to Azure DevOps → Project Settings → Service Connections.

    • Click “New service connection” → Select Docker Registry.

    • Choose Docker Hub or ACR.

    • Provide Docker ID/Registry URL and credentials.

    • Verify and save the connection.

    2. AKS Service Connection

    • Azure DevOps → Project Settings → Service Connections.

    • Click “New service connection” → Select Azure Resource Manager.

    • Use Service Principal (automatic).

    • Select your subscription and AKS resource group.

    • Name the connection and save.

    3. SonarQube Service Connection

    • Azure DevOps → Project Settings → Service Connections.

    • New service connection → SonarQube.

    • Input the Server URL and token.

    • Save and verify.

    Main Features Covered in DevSecOps Pipeline

    Devsecops.drawio (1)

    • Secret Scanning

    • Dependency Scanning (SCA)

    • Static Code Analysis (SAST)

    • Container Image Scanning

    • DAST (Dynamic Application Security Testing)

    • Quality Gates Enforcement

    • Docker Build & Push

    • AKS Deployment

    Pipeline Stages Overview

    1. Secret Scanning

    Trivy

    Tools

    detect-secrets, Trivy

    Steps

    • Install Python and detect-secrets.

    • Scan source code for hardcoded secrets.

    • Run Trivy with --security-checks secret.

    • Save results as HTML → Publish to pipeline artifacts.

    • Apply quality gates to fail builds on critical secrets.

    2. Dependency Scanning (SCA)

    Containerizing OWASP Dependency Check Security Tool | by Deshani Geethika Poddenige | Medium

    Tools

    Safety, Trivy

    Steps

    • Use requirements.txt for dependencies.

    • Run Safety to identify known vulnerabilities.

    • Scan the filesystem using Trivy fs.

    • Publish results.

    • Fail pipeline if critical vulnerabilities exceed the threshold.

    3. Static Code Analysis (SAST)

    SonarQube - Eclipsepedia

     

    Tools

    SonarQube, Bandit

    Steps

    • Use Bandit for Python security issues.

    • Run SonarQube analysis via CLI.

    • Enforce SonarQube Quality Gate to fail the pipeline on low scores.

    4. Container Image Build & Scan

    Docker full logo transparent PNG - StickPNG

    Tools

    Docker, Trivy

    Steps

    • Build the Docker image with a version tag.

    • Scan the image using Trivy.

    • Generate and publish scan reports.

    • Apply a security gate — fail on high-severity vulnerabilities.

    • Push image to ACR if passed.

    5. DAST – OWASP ZAP Scan

    Owasp Zap Logo Png, Transparent Png - kindpng

    Tools

    OWASP ZAP

    Steps

    • Run the app in a test container network.

    • Perform ZAP baseline scan.

    • Save results as HTML.

    • Stop the test container.

    • Apply a security gate to block high-risk findings

    6. Deploy to AKS

    Azure Kubernetes Service: Use Cases | by Ankit Pramanik | Medium

    Tools

    kubectl, Kubernetes 

    Steps

    • Fetch AKS credentials.

    • Use envsubst to fill in manifest variables.

    • Deploy the app via kubectl apply.

    • Trigger a pod restart to deploy a new image.

    Conclusion

    DevSecOps is not just a practice; it’s a mindset. By integrating security at every phase of your CI/CD pipeline, you’re not only protecting your software but also enhancing the speed and confidence with which you can deliver it.

    Implementing these practices with Azure DevOps, SonarQube, Trivy, and other tools makes securing your applications systematic, efficient, and measurable.

    Secure early. Secure often. Secure always. That’s the DevSecOps way.

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleESET Threat Report H1 2025: ClickFix, infostealer disruptions, and ransomware deathmatch
    Next Article House Price Predictor – An MLOps Learning Project Using Azure DevOps

    Related Posts

    Development

    spatie/laravel-flare

    August 9, 2025
    Repurposing Protein Folding Models for Generation with Latent Diffusion
    Artificial Intelligence

    Repurposing Protein Folding Models for Generation with Latent Diffusion

    August 9, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Snyk announces new DAST solution for securing APIs and web apps

    Tech & Work

    Swiss bank data released by hackers

    Development

    At a Time of Indo-Pak Conflict, Why a Digital Blackout Matters—and How to Do It

    Development

    Garuda Linux: Innovazione e Performance con i Nuovi Profili Hardware

    Linux

    Highlights

    Asus waarschuwt voor kritieke AiCloud-kwetsbaarheid in wifi-routers

    April 20, 2025

    Asus waarschuwt voor kritieke AiCloud-kwetsbaarheid in wifi-routers

    Asus waarschuwt voor een kritieke AiCloud-kwetsbaarheid die in verschillende wifi-routers aanwezig is en heeft firmware-updates uitgebracht om het probleem te verhelpen. Via AiCloud kunnen gebruikers …
    Read more

    Published Date:
    Apr 19, 2025 (1 day, 15 hours ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2025-2492

    Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN

    June 11, 2025

    Mongoose Now Natively Supports QE and CSFLE

    June 2, 2025

    CVE-2025-48260 – Ninja Team GDPR CCPA Compliance Support Missing Authorization Vulnerability

    May 19, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.