Aarno Aukia
DevSecOps: Security in DevOps
#1about 3 minutes
Understanding the evolution from waterfall to DevOps
The software development lifecycle shifted from the linear waterfall model to an iterative agile and DevOps approach to better handle continuous maintenance and new features.
#2about 2 minutes
Why security must be integrated from the start
Treating security as a final gatekeeper creates a bottleneck; instead, it should be integrated throughout the development process as a set of non-functional requirements.
#3about 5 minutes
Exploring the core principles of DevSecOps
A successful DevSecOps culture is built on principles like trust, transparency, incremental improvements, automation, and continuous education.
#4about 3 minutes
Automating security checks in the CI/CD pipeline
Integrate automated tools for static code analysis, dependency management, and container image scanning directly into the build process to catch vulnerabilities early.
#5about 3 minutes
Using containers to improve security and deployment
Containers like Docker provide application isolation, prevent running as root, and support best practices such as the 12-factor app pattern for more secure operations.
#6about 6 minutes
Managing production complexity with container orchestration
While Docker packages applications, container orchestrators like Kubernetes are essential for managing production concerns like service discovery, scheduling, and availability.
#7about 2 minutes
Centralizing security services in a Kubernetes ecosystem
The Kubernetes ecosystem enables security teams to provide standardized, centralized services for authentication, logging, and monitoring across all applications.
#8about 5 minutes
Case study of regulated deployments in banking
A Swiss banking software company uses OpenShift and an automated business process framework to manage deployments with auditable approval gates, meeting strict financial regulations.
#9about 4 minutes
Shifting from full-stack audits to additive governance
By certifying a standardized container platform, security governance can shift from repetitive full-stack audits to reviewing only the application and its specific configuration.
Related jobs
Jobs that call for the skills explored in this talk.
aedifion GmbH
Köln, Germany
€30-45K
Intermediate
Network Security
Security Architecture
+1
Technoly GmbH
Berlin, Germany
€50-60K
Intermediate
Network Security
Security Architecture
+2
Matching moments
01:32 MIN
Organizing a developer conference for 15,000 attendees
Cat Herding with Lions and Tigers - Christian Heilmann
05:55 MIN
The security risks of AI-generated code and slopsquatting
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
03:45 MIN
Preventing exposed API keys in AI-assisted development
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
02:48 MIN
Building trust through honest developer advocacy
Devs vs. Marketers, COBOL and Copilot, Make Live Coding Easy and more - The Best of LIVE 2025 - Part 3
11:32 MIN
The industry's focus on frameworks over web fundamentals
WeAreDevelopers LIVE – Frontend Inspirations, Web Standards and more
05:32 MIN
Getting hired by contributing to open source projects
Devs vs. Marketers, COBOL and Copilot, Make Live Coding Easy and more - The Best of LIVE 2025 - Part 3
03:28 MIN
Why corporate AI adoption lags behind the hype
What 2025 Taught Us: A Year-End Special with Hung Lee
03:17 MIN
Selecting strategic partners and essential event tools
Cat Herding with Lions and Tigers - Christian Heilmann
Featured Partners
Related Videos
DevSecOps: Injecting Security into Mobile CI/CD Pipelines
Moataz Nabil
DevSecOps culture
Ali Yazdani
Enabling automated 1-click customer deployments with built-in quality and security
Christoph Ruggenthaler
Demystifying DevOps—Pros, cons, dos & don'ts
Thomas Fuchs, Waleed Arshad & Frank Dornberger & Idir Ouhab Meskine:
What The Hack is Web App Sec?
Jackie
Get security done: streamlining application security with Aikido
Mia Neethling
Climate vs. Weather: How Do We Sustainably Make Software More Secure?
Panel Discussion
You can’t hack what you can’t see
Reto Kaeser
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.




European Tech Recruit
Retortillo de Soria, Spain
Intermediate
Go
Bash
Azure
DevOps
Python
+3

SAP AG
Sankt Leon-Rot, Germany
Junior
Go
Azure
DevOps
Puppet
Docker
+6



