Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Power Of The Intl API: A Definitive Guide To Browser-Native Internationalization

      August 8, 2025

      This week in AI dev tools: GPT-5, Claude Opus 4.1, and more (August 8, 2025)

      August 8, 2025

      Elastic simplifies log analytics for SREs and developers with launch of Log Essentials

      August 7, 2025

      OpenAI launches GPT-5

      August 7, 2025

      5 ways business leaders can transform workplace culture – and it starts by listening

      August 8, 2025

      My 4 favorite image editing apps on Linux – and two are free Photoshop alternatives

      August 8, 2025

      How Google’s Genie 3 could change AI video – and let you build your own interactive worlds

      August 8, 2025

      How you’re charging your tablet is slowly killing it – 3 methods to avoid (and the right way)

      August 8, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Establishing Consistent Data Foundations with Laravel’s Database Population System

      August 8, 2025
      Recent

      Establishing Consistent Data Foundations with Laravel’s Database Population System

      August 8, 2025

      Generate Postman Collections from Laravel Routes

      August 8, 2025

      This Week in Laravel: Free Laravel Idea, Laracon News, and More

      August 8, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Lenovo Legion Go 2 vs Legion Go — How Do These Gaming Handhelds Compare Based on Rumored Specs?

      August 8, 2025
      Recent

      Lenovo Legion Go 2 vs Legion Go — How Do These Gaming Handhelds Compare Based on Rumored Specs?

      August 8, 2025

      9 Default Settings in Windows 11 You Didn’t Know Could Affect Performance and Privacy

      August 8, 2025

      DICE Responds to Battlefield 6 Community: Key Updates on Map Flow and Class Mechanics

      August 8, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»End-to-End DevSecOps in CI/CD Pipelines: Build Secure Apps with Sast, Dast and Azure DevOps

    End-to-End DevSecOps in CI/CD Pipelines: Build Secure Apps with Sast, Dast and Azure DevOps

    August 6, 2025

    Introduction to DevSecOps

    DevSecOps is the evolution of DevOps with a focused integration of security throughout the software development lifecycle (SDLC). It promotes a cultural and technical shift by “shifting security left,”  integrating security early in the CI/CD pipeline instead of treating it as an afterthought.

    Dev Sec Ops Removebg Preview

    While DevOps engineers focus on speed, automation, and reliability, DevSecOps engineers share the same goals with an added responsibility: ensuring security at every stage of the process.

    DevSecOps = Development + Security + Operations

    By embedding security from the beginning, DevSecOps enables organizations to build secure software faster, reduce costs, and minimize risks.

    Why Shift Left with Security?

    Dollar Logo PNG Vectors Free Download

    Cost Savings

    Search Bug Icons - Free SVG & PNG Search Bug Images - Noun Project

    Early Detection

     

    Shifting security left means embedding security checks earlier in the pipeline. This approach offers several key benefits:

     

     

    • Early Detection: Identifies vulnerabilities before they reach production.
    • Cost Savings: Fixing security issues in earlier phases of development is significantly more cost-effective.

    • Reduced Risk: Early intervention helps prevent critical vulnerabilities from being deployed.

    Implementing DevSecOps in an Existing CI/CD Pipeline

    Prerequisites

    To implement DevSecOps in your Azure DevOps pipeline, ensure the following infrastructure is in place:

    • Azure VM (for self-hosted Azure DevOps agent)

    • Azure Kubernetes Service (AKS)

    • Azure Container Registry (ACR)

    • Azure DevOps project and repository

    • SonarQube (for static code analysis)Docker Registry Service Connection​

    Service Connections Setup

    1. Docker Registry Connection

    • Go to Azure DevOps → Project Settings → Service Connections.

    • Click “New service connection” → Select Docker Registry.

    • Choose Docker Hub or ACR.

    • Provide Docker ID/Registry URL and credentials.

    • Verify and save the connection.

    2. AKS Service Connection

    • Azure DevOps → Project Settings → Service Connections.

    • Click “New service connection” → Select Azure Resource Manager.

    • Use Service Principal (automatic).

    • Select your subscription and AKS resource group.

    • Name the connection and save.

    3. SonarQube Service Connection

    • Azure DevOps → Project Settings → Service Connections.

    • New service connection → SonarQube.

    • Input the Server URL and token.

    • Save and verify.

    Main Features Covered in DevSecOps Pipeline

    Devsecops.drawio (1)

    • Secret Scanning

    • Dependency Scanning (SCA)

    • Static Code Analysis (SAST)

    • Container Image Scanning

    • DAST (Dynamic Application Security Testing)

    • Quality Gates Enforcement

    • Docker Build & Push

    • AKS Deployment

    Pipeline Stages Overview

    1. Secret Scanning

    Trivy

    Tools

    detect-secrets, Trivy

    Steps

    • Install Python and detect-secrets.

    • Scan source code for hardcoded secrets.

    • Run Trivy with --security-checks secret.

    • Save results as HTML → Publish to pipeline artifacts.

    • Apply quality gates to fail builds on critical secrets.

    2. Dependency Scanning (SCA)

    Containerizing OWASP Dependency Check Security Tool | by Deshani Geethika Poddenige | Medium

    Tools

    Safety, Trivy

    Steps

    • Use requirements.txt for dependencies.

    • Run Safety to identify known vulnerabilities.

    • Scan the filesystem using Trivy fs.

    • Publish results.

    • Fail pipeline if critical vulnerabilities exceed the threshold.

    3. Static Code Analysis (SAST)

    SonarQube - Eclipsepedia

     

    Tools

    SonarQube, Bandit

    Steps

    • Use Bandit for Python security issues.

    • Run SonarQube analysis via CLI.

    • Enforce SonarQube Quality Gate to fail the pipeline on low scores.

    4. Container Image Build & Scan

    Docker full logo transparent PNG - StickPNG

    Tools

    Docker, Trivy

    Steps

    • Build the Docker image with a version tag.

    • Scan the image using Trivy.

    • Generate and publish scan reports.

    • Apply a security gate — fail on high-severity vulnerabilities.

    • Push image to ACR if passed.

    5. DAST – OWASP ZAP Scan

    Owasp Zap Logo Png, Transparent Png - kindpng

    Tools

    OWASP ZAP

    Steps

    • Run the app in a test container network.

    • Perform ZAP baseline scan.

    • Save results as HTML.

    • Stop the test container.

    • Apply a security gate to block high-risk findings

    6. Deploy to AKS

    Azure Kubernetes Service: Use Cases | by Ankit Pramanik | Medium

    Tools

    kubectl, Kubernetes 

    Steps

    • Fetch AKS credentials.

    • Use envsubst to fill in manifest variables.

    • Deploy the app via kubectl apply.

    • Trigger a pod restart to deploy a new image.

    Conclusion

    DevSecOps is not just a practice; it’s a mindset. By integrating security at every phase of your CI/CD pipeline, you’re not only protecting your software but also enhancing the speed and confidence with which you can deliver it.

    Implementing these practices with Azure DevOps, SonarQube, Trivy, and other tools makes securing your applications systematic, efficient, and measurable.

    Secure early. Secure often. Secure always. That’s the DevSecOps way.

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleESET Threat Report H1 2025: ClickFix, infostealer disruptions, and ransomware deathmatch
    Next Article House Price Predictor – An MLOps Learning Project Using Azure DevOps

    Related Posts

    Development

    Establishing Consistent Data Foundations with Laravel’s Database Population System

    August 8, 2025
    Development

    Generate Postman Collections from Laravel Routes

    August 8, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    DeepReinforce Team Introduces CUDA-L1: An Automated Reinforcement Learning (RL) Framework for CUDA Optimization Unlocking 3x More Power from GPUs

    Machine Learning

    AdGuard now joins in to block Windows Recall

    Operating Systems

    CVE-2025-45769 – PHP JWT Weak Encryption Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2024-54172 – IBM Sterling B2B Integrator and IBM Sterling File Gateway Cross-Site Request Forgery

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2022-50217 – Linux Kernel Fuse Write Inode Race Condition Vulnerability

    June 18, 2025

    CVE ID : CVE-2022-50217

    Published : June 18, 2025, 11:15 a.m. | 3 hours, 16 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    fuse: write inode in fuse_release()

    A race between write(2) and close(2) allows pages to be dirtied after
    fuse_flush -> write_inode_now(). If these pages are not flushed from
    fuse_release(), then there might not be a writable open file later. So any
    remaining dirty pages must be written back before the file is released.

    This is a partial revert of the blamed commit.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-5878 – “ESAPI SQL Injection Defense Encoder Encoder.encodeForSQL Improper Neutralization”

    June 29, 2025

    Don’t Tread on Me Penguins Against Trump Shirt https://viralstyle.com/graydesigner/dont-tread-on-me-penguins-against-trump Make a bold statement with our “Don’t Tread on Me Penguins Against Trump” shirt. This eye-catching design features rebellious penguins standing up to Trump, blending humor with political activism. Perfect for protests, casual wear, or sparking conversation. Soft, high-quality cotton for all-day comfort. Wear your values loud and proud!

    April 5, 2025

    Proactive, Not Reactive – The Key to Inclusive and Accessible Design

    June 20, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.