[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [AppSec](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security?ts=markdown) 4. [How to Transition from DevOps to DevSecOps](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops?ts=markdown) Table of Contents * [What Is AppSec?](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security?ts=markdown) * [AppSec Explained](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#appsec?ts=markdown) * [The Fundamentals of AppSec](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#fundamentals?ts=markdown) * [Building Security into the Development Lifecycle](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#building?ts=markdown) * [Implementing Secure Coding Practices](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#implementing?ts=markdown) * [Application Security Testing](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#testing?ts=markdown) * [Implementing Security in CI/CD Pipelines](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#pipelines?ts=markdown) * [Securing Application Architecture](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#architecture?ts=markdown) * [Access Control and Authentication](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#access?ts=markdown) * [Monitoring and Incident Response](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#monitoring?ts=markdown) * [Managing AppSec in Production](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#managing?ts=markdown) * [Training and Building a Security-First Culture](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#training?ts=markdown) * [AppSec Trends](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#trends?ts=markdown) * [AppSec FAQs](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#faqs?ts=markdown) * [What Is Sandboxing?](https://www.paloaltonetworks.com/cyberpedia/sandboxing?ts=markdown) * [Sandboxing Explained](https://www.paloaltonetworks.com/cyberpedia/sandboxing#sandboxing?ts=markdown) * [Sandboxing in Email Security](https://www.paloaltonetworks.com/cyberpedia/sandboxing#security?ts=markdown) * [Endpoint Sandboxing and EDR](https://www.paloaltonetworks.com/cyberpedia/sandboxing#endpoint?ts=markdown) * [Browser Isolation and Web Sandboxing](https://www.paloaltonetworks.com/cyberpedia/sandboxing#browser?ts=markdown) * [Sandboxing in Cloud-Native Workflows](https://www.paloaltonetworks.com/cyberpedia/sandboxing#workflows?ts=markdown) * [Sandbox Evasion and Threat Actor Tradecraft](https://www.paloaltonetworks.com/cyberpedia/sandboxing#tradecraft?ts=markdown) * [Real-World Case Studies in Sandboxing Effectiveness](https://www.paloaltonetworks.com/cyberpedia/sandboxing#effectiveness?ts=markdown) * [Feeding Sandboxed Intelligence into XDR and SOC Pipelines](https://www.paloaltonetworks.com/cyberpedia/sandboxing#feeding?ts=markdown) * [Sandboxing FAQs](https://www.paloaltonetworks.com/cyberpedia/sandboxing#faqs?ts=markdown) * [Application Security: A Practitioner's Guide](https://www.paloaltonetworks.com/cyberpedia/application-security?ts=markdown) * [Application Security Explained](https://www.paloaltonetworks.com/cyberpedia/application-security#application?ts=markdown) * [Types of Applications Organizations Need to Secure](https://www.paloaltonetworks.com/cyberpedia/application-security#types?ts=markdown) * [Whose Job Is It -- Developers or Security?](https://www.paloaltonetworks.com/cyberpedia/application-security#security?ts=markdown) * [A Pragmatic Guide for Security-Minded Developers](https://www.paloaltonetworks.com/cyberpedia/application-security#developers?ts=markdown) * [Types of Application Security Testing](https://www.paloaltonetworks.com/cyberpedia/application-security#testing?ts=markdown) * [Application Security Tools and Solutions](https://www.paloaltonetworks.com/cyberpedia/application-security#solutions?ts=markdown) * [Compliance Is Not Security, But It's Not Optional Either](https://www.paloaltonetworks.com/cyberpedia/application-security#compliance?ts=markdown) * [Application Security FAQs](https://www.paloaltonetworks.com/cyberpedia/application-security#faqs?ts=markdown) * [What Is Cloud Detection and Response (CDR)?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr?ts=markdown) * [Cloud Detection and Response (CDR) Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#explained?ts=markdown) * [How CDR Works](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#how?ts=markdown) * [Key Features of CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#key?ts=markdown) * [CDR and Other Detection and Response Approaches](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#vs?ts=markdown) * [How CDR and XSIAM Work Together](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#work?ts=markdown) * [How CDR Addresses Unique Challenges in Cloud Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#addressing?ts=markdown) * [Key Capabilities of CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#capabilities?ts=markdown) * [How CDR Bridges SOC and Cloud Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#bridging?ts=markdown) * [Challenges of Implementing CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#potential?ts=markdown) * [CDR Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#practices?ts=markdown) * [Cloud Detection and Response FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#faqs?ts=markdown) * How to Transition from DevOps to DevSecOps * [Initiate a Security-First Culture](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#initiate-a-security-first-culture?ts=markdown) * [Incorporate Secure DevOps Practices](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#devops-practices?ts=markdown) * [Automate and Monitor Security](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#automate-and-monitor-security?ts=markdown) * [Evaluate and Maintain Security Posture](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#maintain-security-posture?ts=markdown) * [Ensure Compliance and Effective Incident Response](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#effective-incident-response?ts=markdown) * [Continuous Improvement in Security](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#improvement-in-security?ts=markdown) * [DevOps to DevSecOps FAQs](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#faq?ts=markdown) * [Cloud Security Service, Cloud Storage and Cloud Technology](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology?ts=markdown) * [Cloud and Platform as a Service](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#cloud-and-pass?ts=markdown) * [Infrastructure as a Service -- The Public Cloud](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#information-as-a-service?ts=markdown) * [Comprehensive, Scalable Cloud Security with Flexible Licensing Options](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#scalable-cloud-security?ts=markdown) * [Cloud Security Service, Storage and Technology FAQs](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#faq?ts=markdown) * [How Does VMware NSX Security Work](https://www.paloaltonetworks.com/cyberpedia/how-does-vmware-nsx-security-work?ts=markdown) * [What Is the Software Development Lifecycle (SDLC)?](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle?ts=markdown) * [Software Development Lifecycle Explained](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#software?ts=markdown) * [Why the SDLC Matters](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#why?ts=markdown) * [Foundational Phases](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#phases?ts=markdown) * [Common SDLC Models](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#common?ts=markdown) * [Security and Compliance Integration](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#security?ts=markdown) * [SDLC in Context](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#context?ts=markdown) * [SDLC Challenges](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#challenges?ts=markdown) * [Choosing or Tailoring an SDLC Model](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#choosing?ts=markdown) * [SDLC Tooling and Automation](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#automation?ts=markdown) * [Version Control and CI/CD Pipelines](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#version?ts=markdown) * [Value-Stream Metrics and Visibility](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#visibility?ts=markdown) * [Cloud, On-Premises, and Hybrid Considerations](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#cloud?ts=markdown) * [Best-Practice Guidelines for High-Velocity Delivery](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#best?ts=markdown) * [Next Steps Toward Lifecycle Maturity](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#next?ts=markdown) * [Software Development Lifecycle FAQs](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#faqs?ts=markdown) * [What Is SDLC Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle?ts=markdown) * [SDLC Security Overview](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#sdlc?ts=markdown) * [Security Across the Classic SDLC Phases](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#security?ts=markdown) * [Common Vulnerabilities and Attack Vectors in the SDLC](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#common?ts=markdown) * [Foundational Secure-SDLC Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#practices?ts=markdown) * [Tooling and Automation Layers](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#tooling?ts=markdown) * [Frameworks and Standards for Secure SDLC](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#frameworks?ts=markdown) * [DevSecOps Integration](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#devsecops?ts=markdown) * [Metrics and Continuous Improvement](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#metrics?ts=markdown) * [Advancements in Software Supply Chain Defense](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#advancements?ts=markdown) * [Roadmap to Secure-SDLC Maturity](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#roadmap?ts=markdown) * [SDLC Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#faqs?ts=markdown) # How to Transition from DevOps to DevSecOps 5 min. read Table of Contents * * [Initiate a Security-First Culture](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#initiate-a-security-first-culture?ts=markdown) * [Incorporate Secure DevOps Practices](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#devops-practices?ts=markdown) * [Automate and Monitor Security](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#automate-and-monitor-security?ts=markdown) * [Evaluate and Maintain Security Posture](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#maintain-security-posture?ts=markdown) * [Ensure Compliance and Effective Incident Response](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#effective-incident-response?ts=markdown) * [Continuous Improvement in Security](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#improvement-in-security?ts=markdown) * [DevOps to DevSecOps FAQs](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#faq?ts=markdown) 1. Initiate a Security-First Culture * * [Initiate a Security-First Culture](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#initiate-a-security-first-culture?ts=markdown) * [Incorporate Secure DevOps Practices](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#devops-practices?ts=markdown) * [Automate and Monitor Security](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#automate-and-monitor-security?ts=markdown) * [Evaluate and Maintain Security Posture](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#maintain-security-posture?ts=markdown) * [Ensure Compliance and Effective Incident Response](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#effective-incident-response?ts=markdown) * [Continuous Improvement in Security](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#improvement-in-security?ts=markdown) * [DevOps to DevSecOps FAQs](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#faq?ts=markdown) Transitioning from a DevOps to DevSecOps approach to application development is key to securing the [CI/CD pipeline](https://www.paloaltonetworks.com/cyberpedia/what-is-the-ci-cd-pipeline-and-ci-cd-security?ts=markdown). This transition involves an organization-wide change, necessitating the integration of security aspects into every phase of the [software development lifecycle](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle?ts=markdown). We've outlined several considerations, steps, and guidelines to help your [DevOps](https://www.paloaltonetworks.com/cyberpedia/what-is-devops?ts=markdown) teams shift-left. Regardless of your timeline, successfully journeying to DevSecOps through enhanced threat awareness, improved risk management, and a proactive approach to security challenges will reduce development pipeline vulnerabilities and protect your organization's most vital assets. ## Initiate a Security-First Culture Cultivating a security-first culture is the cornerstone of a resilient [DevSecOps](https://www.paloaltonetworks.com/cyberpedia/what-is-devsecops?ts=markdown) model. It instills an organizational mindset that prioritizes security in every task, from software development to business operations. ### Adopt the Security-First Mindset DevSecOps is a security-first mindset. Create a culture that prioritizes and integrates security into every aspect of the application lifecycle. Encourage collaboration, shared responsibility, and continuous improvement among development, operations, and security teams. Promote open communication, knowledge sharing, and cross-functional training. Emphasize the importance of security from practitioner to C-suite to build a cohesive DevSecOps culture throughout your organization. ### DevSecOps Training and Education Provide ongoing security training and education programs for all individuals involved in the CI/CD pipeline, including developers, operations personnel, and security teams. Training should cover evolving security threats, secure coding practices, secure infrastructure configurations, and the proper use of security tools. Continuous training helps maintain a strong security mindset and ensures that individuals stay updated with the latest security practices and technologies. ### Break Down the Silos Integrate security into continuous delivery pipelines, ensuring it becomes a vital part of the entire application lifecycle, from design to deployment. Consider creating shared goals and aligning team objectives to encourage cross-functional collaboration and communication between development, operations, and security teams. Involve security experts early in the software development process, ensuring they have a voice in design decisions, code reviews, and testing. Make sure all teams understand each other's roles, responsibilities, perspectives --- and the value they bring to achieving shared goals. ### Support Security Champions Identify individuals who act as advocates for security by promoting best practices, providing guidance, and assisting with security-related tasks. Empower them to lead by example within their respective teams. Encourage security champions to embed security considerations into workflows and decision-making processes. And reward their efforts. Rewarding security champions will incentivize them and others to take an active role in improving security. ### Stay Updated on Emerging Threats and Security Practices Stay abreast of the evolving threat landscape and emerging practices relevant to [CI/CD security](https://www.paloaltonetworks.com/cyberpedia/what-is-ci-cd-security?ts=markdown). Your approach might include monitoring security forums, attending industry conferences, participating in security communities, and following reputable security blogs and publications. Keeping up to date on the latest trends and innovations will equip your organization to prevent and mitigate emerging threats. ## Modernize Application Architecture DevSecOps teams should prioritize cloud-based and cloud-native [microservices](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices?ts=markdown) architecture to enhance scalability, flexibility, and security, which will enable your organization's DevSecOps engineers to identify and fix vulnerabilities quickly without disrupting operations. ### Leverage Containers for Isolation Enhance your application security by leveraging [containers](https://www.paloaltonetworks.com/cyberpedia/what-is-a-container?ts=markdown) to separate application components and dependencies, ensuring a streamlined continuous deployment process. By isolating each service, you can quickly identify and address security threats, reducing the risk of widespread system breaches. ### Keep Infrastructure Immutable Practice immutable infrastructure to prevent configuration drift and reduce attack surface. Any changes should occur through the [infrastructure as code (IaC)](https://www.paloaltonetworks.com/cyberpedia/what-is-iac?ts=markdown) pipeline. DevOps teams should work closely with application security experts to ensure a smooth transition to DevSecOps practices, fostering collaboration between development and operations teams. ## Incorporate Secure DevOps Practices Secure development practices lie at the heart of the DevSecOps framework. These practices transform the creation process --- from shifting security considerations to the project's inception and automating testing to maintaining a secure supply chain. Organizations that implement secure development practices not only bolsters your security posture but also streamlines the development pipeline, ultimately enhancing efficiency and product reliability. ### Deploy Secure DevOps Toolchains Evaluate and select secure DevOps tools and technologies that align with your CI/CD security requirements. Choose tools that have built-in security features, integrate well with your existing security infrastructure, and support secure communication protocols. Regularly review and update these tools to ensure they remain secure and up to date. ### Shift Left Security Embed security practices and testing earlier in the software development lifecycle. By identifying and addressing security issues early on, organizations can minimize the impact and cost of remediating vulnerabilities discovered at later stages. The shift-left approach includes incorporating security requirements into user stories, conducting threat modeling, and performing secure coding practices from the outset. ### Execute Secure Software Development Lifecycle (SDLC) Integrate security checkpoints and activities into the software development lifecycle. Begin with defining security requirements and include conducting threat modeling, performing security testing at various stages, and ensuring secure code deployment and configuration management. By incorporating security into the SDLC, you'll proactively identify and address security issues throughout the software development process. ### Enforce Secure Code Reviews Incorporate secure code reviews as an integral part of the development process within the CI/CD pipeline. Peer code reviews with a focus on security help identify vulnerabilities, coding errors, and potential weaknesses in the codebase. Provide developers with security guidelines and training to ensure they have the knowledge and skills to write secure code. ### Incorporate Security as Code Apply the concept of "security as code" by treating security controls and policies as code artifacts. You can use [infrastructure-as-code](https://www.paloaltonetworks.com/cyberpedia/what-is-iac?ts=markdown) tools to define and manage security configurations, making them version-controlled, auditable, and repeatable. The security-as-code approach ensures consistent and automated application of security controls across environments. ### Automate Security Testing Incorporating automated security testing tools, such as static analysis security testing (SAST), dynamic analysis security testing (DAST), interactive application security testing (IAST), and [software composition analysis (SCA)](https://www.paloaltonetworks.com/cyberpedia/what-is-sca?ts=markdown). These tools can be integrated into the CI/CD pipeline to identify vulnerabilities, misconfigurations, and security weaknesses throughout the development and deployment process. ### Erect Security Gates Introduce security gates at different stages of the CI/CD pipeline to ensure that security checks are performed before progressing to the next stage. Incorporate [static code analysis](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing?ts=markdown), vulnerability scanning, and compliance checks, for example, as automated steps before promoting code to the next environment. ### Establish Change Management Processes All changes to the pipeline, including infrastructure, configurations, and code deployments, should go through a formal change management process that includes thorough testing, peer reviews, and approval procedures. Setting up reliable change management processes within the CI/CD pipeline will help to maintain control and accountability while reducing the risk of introducing security vulnerabilities. ### Operationalize Secure Configuration Management Apply secure configuration management practices to all components of the CI/CD pipeline, including servers, containers, and infrastructure. Secure configuration involves hardening the configurations, disabling unnecessary services, applying appropriate security patches, and utilizing secure communication protocols. Automated configuration management tools can consistently enforce and maintain secure configurations. ### Maintain a Secure Software Supply Chain Ensure the security of the software supply chain by validating the integrity and authenticity of software components and dependencies used within the CI/CD pipeline. Implement controls to verify the origin and integrity of open-source libraries, containers, and other software artifacts. Regularly monitor for security advisories and updates related to the software components used in the pipeline. ## Automate and Monitor Security Automating and monitoring security injects a potent dose of efficiency and vigilance into a DevSecOps model. Automation tools swiftly identify vulnerabilities, enabling faster remediation, while continuous monitoring provides real-time visibility into your security landscape. Using both in tandem eliminates manual errors, frees up resources, and uncovers potential threats before they cause harm. The result is a formidable and dynamic defense. ### Leverage Security Orchestration and Automation Use security orchestration and automation tools to streamline and standardize security processes within the CI/CD pipeline. Automation can help with vulnerability scanning, security policy enforcement, incident response, and security incident management. Properly allocating security orchestration and automation tools will reduce manual effort, improve consistency, and enable rapid response to security incidents. ### Define and Monitor Secure DevOps Metrics Define and track security-focused metrics that provide insights into the effectiveness of security controls and the overall security posture of the CI/CD pipeline. Monitor these metrics continuously and use them to identify trends, measure improvement, and prioritize security initiatives. Metrics such as time to remediate vulnerabilities, number of successful security tests, and incident response metrics can provide valuable insights. ### Initiate Continuous Security Monitoring Establish continuous security monitoring throughout the CI/CD pipeline and continuous deployment environment. Include real-time log analysis, suspicious activities, anomalies, intrusion detection systems and security information and event management (SIEM) tools. Monitoring helps detect and respond to security incidents promptly and provides valuable insights for improving security controls. Stay updated with threat intelligence sources and adjust security controls accordingly. ### Continuously Assess and Remediate Vulnerabilities Integrate vulnerability management practices into the CI/CD pipeline. This activity goes beyond regularly scanning for vulnerabilities in dependencies, libraries, and system components. Establish processes to prioritize and remediate vulnerabilities based on context, particularly as it pertains to severity, impact, and exploitability. Automation can help identify, track, and address attack paths. ## Evaluate and Maintain Security Posture Maintaining a formidable security posture is integral to long-term resilience in an evolving cyberthreat landscape. Regular assessments, audits, and red team exercises uncover weaknesses. Routine updates to security policies and tools ensure you're armed with the latest protection. Prevention efforts, combined with information sharing, enable organizations to adapt to threats and maintain a posture best described as anticipatory. ### Conduct Regular Security Risk Assessments Perform regular risk assessments to surface security gaps in the CI/CD pipeline. The evaluation should include penetration testing and aim to identify potential threats, vulnerabilities, and risks associated with the pipeline's architecture, configurations, access controls, and integrations. Organizations should remediate and resolve all identified risks through appropriate controls and follow up with a reassessment to ensure the efficacy of mitigations. ### Engage External Security Expertise Consider engaging third-party security experts to conduct independent assessments and provide objective insights on the security posture of the CI/CD pipeline. External assessments can help identify blind spots, validate security controls, and provide recommendations for improvement. Findings from these evaluations should prompt immediate action to address identified issues. ### Conduct Red Team Exercises Perform red team exercises to simulate real-world attacks and identify potential security weaknesses in the CI/CD pipeline. Red team exercises involve skilled security professionals attempting to breach the pipeline's security controls and identify vulnerabilities. The insights gained from these exercises can help identify areas for improvement and validate the effectiveness of existing security measures. ### Regularly Review and Update Security Policies Review and update security policies and procedures regularly to align with evolving security requirements, industry standards, and regulatory frameworks. Ensure that policies reflect the organization's CI/CD security objectives and provide clear guidance on security controls, incident response, access management, and other relevant areas. ### Update Security Tools and Frameworks Stay current with the latest versions of security tools, frameworks, and libraries used within the CI/CD pipeline. Keep track of security advisories and patches released by vendors and promptly update tools and frameworks to mitigate known vulnerabilities. Adhering to this practice will ensure your security tools remain capable of identifying and addressing emerging threats. ### Conduct Vendor Security Assessments If third-party services or components are used within the CI/CD pipeline, conduct thorough security assessments of these vendors or providers. Evaluate their security practices, certifications, and compliance with relevant security standards. Ensure they have reliable security controls to mitigate risks associated with third-party dependencies. ## Ensure Compliance and Effective Incident Response Compliance and effective incident response form the bedrock of a trusted, resilient DevSecOps model. Remaining compliant with regulations safeguards your reputation, while an efficient incident response minimizes the potential damage of breaches. With proper preparation, organizations can bounce back from an incident faster and with less impact on operations. ### Stay Compliant with Applicable Regulations Ensure that the CI/CD pipeline aligns with regulatory requirements, industry standards, and data protection laws. Understand the specific security and compliance requirements that apply to your organization and implement the necessary controls and processes to remain compliant. Regularly review and update security policies and procedures to reflect changing regulatory landscapes. ### Codify Continuous Compliance Monitoring Ensure ongoing compliance with relevant security standards, frameworks, and regulatory requirements. Implement continuous compliance monitoring processes and tools to track and report compliance status within the CI/CD pipeline. Regularly assess and validate compliance controls to promptly address gaps or noncompliance issues. ### Establish Incident Response and Security Incident Management Develop and document an incident response plan specific to your CI/CD pipeline. Ensure that your plan outlines the steps to take in the event of a security incident or breach. You also want to define roles and responsibilities, communication protocols, containment measures, and remediation procedures. Regularly test and update the incident response plan to hone its effectiveness in a changing threat landscape. ### Establish Incident Response Exercises Conduct regular incident response exercises to test the effectiveness of your CI/CD pipeline's incident response plan. Simulate various security incidents and assess the response capabilities of your team. Identify areas for improvement, update the incident response plan accordingly, and provide necessary training to enhance incident response readiness. ### Establish Incident Response Integration Integrate the CI/CD pipeline with the organization's overall incident response capabilities. Define communication channels, escalation procedures, and incident response playbooks specific to CI/CD-related security incidents. Response integration will ensure coordinated efforts that minimize the impact of breach on both the pipeline and the organization. ### Backup and Test Restore Procedures Perform regular backups of critical components in the CI/CD pipeline, such as source code repositories, build servers, and configuration files. Regularly test the restore procedures to ensure that backups are reliable and restorable in the event of data loss or system compromise. The net result of this routine pays dividends in terms of resilient business operations capable of weathering cyber incidents while maintaining service continuity and stakeholder trust. ## Continuous Improvement in Security Continuous security improvement is a vital strategy to help organizations navigate the dynamic and evolving threat landscape. Taking the iterative approach goes beyond reacting to incidents and seeks to enhance existing security practices and infrastructure. By analyzing feedback and learning from oversights, organizations can optimize their defenses, uncover new opportunities for automation, and stay one step ahead of attackers. The outcome for forward-thinking DevSecOps teams is a resilient, agile security posture primed to confront threats head-on. ### Maintain a Feedback Loop Refine security practices within the DevSecOps environment. Encourage feedback from developers, operations personnel, and security experts to identify areas for improvement and follow up with necessary adjustments. By investing in the ongoing betterment of security, organizations preserve customer trust and company reputation. Every front sees gains in cost-effectiveness --- whether from preempting the escalation of risks by catching vulnerabilities early, accelerating time to market, avoiding compliance fines and legal complications, or holding onto your talent. Endorsing a culture of continuous improvement to adapt to evolving security challenges is good business. ### Engage in Security Information Sharing Participate in security information sharing initiatives and communities that pertain to CI/CD security. Exchange experiences, lessons learned, and best practices with your peers. Collaboration and information sharing will broaden the collective understanding of CI/CD security challenges and accelerate innovations in supplant emerging threats. ## Learn More By embracing these practices and transitioning from DevOps to DevSecOps, organizations can establish a mature and highly secure CI/CD pipeline. A strong security culture, paired with an integrated [CNAPP](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform?ts=markdown) that brings together the capabilities you need, will enable you to anticipate evolving threats, protect critical assets, and deliver secure software with efficiency and confidence. [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud/software-supply-chain-security?ts=markdown) will help your teams protect your software supply chain with complete visibility and policy enforcement across software components and delivery pipelines. If you're interested in experiencing end-to-end protection for your CI/CD pipelines, [take Prisma Cloud for a test drive with a free 30-day trial](https://www.paloaltonetworks.com/prisma/request-a-prisma-cloud-trial?ts=markdown). ## DevOps to DevSecOps FAQs ### What is Secure by Design? Secure by Design is an application development approach that emphasizes the integration of security measures and best practices from the earliest stages of the development lifecycle. The goal of this approach is to minimize vulnerabilities, breaches, and potential risks in applications and systems. By incorporating security elements during the design phase, DevOps engineers proactively address potential issues, ensuring a solid and secure foundation for the app. ### What is penetration testing? Penetration testing, also known as pentesting, is a practice where security experts simulate a cyberattack against a computer system, network, or web application to identify vulnerabilities that could be exploited by hackers. It's an essential tool for finding real-world security weaknesses before an attacker does. ### What is interactive application security testing (IAST)? IAST is a security testing method that combines elements of static (SAST) and dynamic application security testing (DAST) to use while the application is running in its production environment. IAST tools monitor application behavior and data flow to identify security vulnerabilities. ### What is RASP? Runtime application self-protection (RASP) is a security technology that embeds into an application or its runtime environment and actively detects and prevents attacks as they occur. RASP solutions can identify malicious behavior or attacks by analyzing both the app's behavior and the context of that behavior. It's designed to halt attacks without human intervention, offering protection from the inside. Related Content [Cloud Security Glossary \& FAQs Got cloud security questions? Find answers as well as best practices, key cloud security concepts, terminology --- and links to relevant cloud security articles.](https://www.paloaltonetworks.com/cyberpedia/cloud-security-glossary-faqs?ts=markdown) [CI/CD Security Checklist Learn six best practices to proactively address CI/CD pipeline weaknesses.](https://www.paloaltonetworks.com/resources/datasheets/cicd-security-checklist?ts=markdown) [The DevSecGuide to IaC Security Guide Learn the security benefits and challenges of adopting infrastructure as code (IaC) and how you can leverage it to secure your cloud-native applications.](https://www.paloaltonetworks.com/resources/whitepapers/devsecguide-to-infrastructure-as-code?ts=markdown) [Top 10 CI/CD Security Risks: The Technical Guide The CI/CD attack surface has changed considerably in recent years, making it challenging to know where to get started with CI/CD security.](https://www.paloaltonetworks.com/resources/whitepapers/top-10-cicd-security-risks?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=How%20to%20Transition%20from%20DevOps%20to%20DevSecOps&body=Make%20the%20transition%20from%20DevOps%20to%20DevSecOps%20to%20eliminate%20friction%20and%20achieve%20end-to-end%20CI%2FCD%20pipeline%20security%20with%20how-to%20guidance%2C%20tips%2C%20and%20checklist%20tasks.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/devops-to-devsecops) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr?ts=markdown) What Is Cloud Detection and Response (CDR)? [Next](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology?ts=markdown) Cloud Security Service, Cloud Storage and Cloud Technology {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language