← CRA Glossary
Product Security Engineering

DevSecOps

DevSecOps is the practice of integrating security tools, testing, and responsibilities throughout the software development and operations pipeline — making security a shared responsibility of development, security, and operations teams rather than a final-stage gate. DevSecOps operationalises the CRA's SDLC requirements in modern continuous delivery environments.

DevSecOps is the practice of integrating security tools, testing, and responsibilities throughout the software development and operations pipeline — making security a shared responsibility of development, security, and operations teams rather than a final-stage gate. DevSecOps operationalises the CRA's SDLC requirements in modern continuous delivery environments.

Product Security Engineering

What Is DevSecOps?

DevSecOps extends the DevOps practice of integrating development and operations by adding security as a core, automated component of the development pipeline. In a DevSecOps model, security testing (SAST, DAST, SCA), security configuration validation, and secret scanning are all automated and run on every code commit or build — security is 'shifted left' into the development process rather than being a separate audit gate. The goal is to detect security issues early, when they are cheapest to fix, and to prevent known vulnerability classes from ever reaching production. For manufacturers of CRA-covered products, DevSecOps provides the technical infrastructure to operationalise the SDLC obligations required by Annex I without creating bottlenecks in release velocity.

CRA reference:Annex I

Key DevSecOps Controls for CRA Manufacturers

A CRA-aligned DevSecOps pipeline should incorporate the following automated security controls:

  • SAST (Static Application Security Testing): Analyses source code and binaries for known vulnerability patterns (CWE instances). Tools: Semgrep, CodeQL, Coverity, SonarQube.
  • SCA (Software Composition Analysis): Identifies known CVEs in third-party dependencies and generates the SBOM. Tools: Dependency-Track, Snyk, FOSSA, Syft.
  • Secret scanning: Detects hardcoded credentials, API keys, and cryptographic material committed to source code. Tools: Gitleaks, Trufflehog, GitHub Advanced Security.
  • DAST (Dynamic Application Security Testing): Tests running applications for exploitable vulnerabilities through automated attack simulation. Tools: OWASP ZAP, Burp Suite (automated).
  • Container scanning: Analyses container images for OS and application vulnerabilities. Tools: Trivy, Grype, Snyk Container.
  • Infrastructure-as-code scanning: Detects misconfiguration in deployment infrastructure. Tools: Checkov, tfsec.
CRA reference:Annex I

DevSecOps Pipeline Architecture for CRA

A practical DevSecOps architecture for a CRA-covered product manufacturer typically stages security controls through the pipeline:

Pre-commit (developer workstation): IDE plugins for SAST linting; secret scanning on git commit hooks.

CI pipeline (on every pull request): SAST scan of changed code; SCA scan with SBOM update; secret scanning; unit tests including security-relevant cases.

Build pipeline (on merge to main): Full SCA scan; container scanning; SBOM generation and signing; policy gate (fail build on new Critical findings without approved exception).

Release pipeline (on release candidate): DAST scan of integration environment; firmware binary analysis; SBOM publishing to Dependency-Track; security sign-off checkpoint.

Post-release monitoring: Dependency-Track continuous CVE monitoring; EPSS score monitoring for SBOM components; alert to PSIRT on new Critical findings.

CRA reference:Annex I

DevSecOps Culture and Shared Responsibility

DevSecOps is as much a cultural shift as a tooling change. The core principle is that security is everyone's responsibility — developers own the security of the code they write; security engineers provide tooling, guidance, and triage support; operations teams are responsible for secure deployment and monitoring. For CRA manufacturers, this means:

  • Security training for all developers, not just a dedicated security team.
  • Security champions in each development team who are the primary contact for security questions.
  • Published secure coding guidelines specific to the technology stack.
  • Blameless security retrospectives that treat security findings as learning opportunities.
  • Metrics that track security debt (number of open vulnerabilities by severity) alongside feature velocity.

CRA compliance requires documentation that security was addressed throughout development. DevSecOps provides the pipeline artifacts — scan reports, SBOM records, policy gate outcomes — that constitute this evidence.

CVD Portal makes DevSecOps compliance straightforward.

Public CVD submission portal, acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for EU manufacturers.

Start your free portal

Frequently asked

Is DevSecOps required for CRA compliance or just recommended?+

The CRA requires that manufacturers integrate security throughout the product development lifecycle — this is the substance of the SDLC obligation in Annex I. DevSecOps is the modern operationalisation of this requirement in continuous delivery environments. A manufacturer using a traditional waterfall development process with separate security testing phases can also comply with the CRA, provided security is genuinely addressed. However, DevSecOps's automated, continuous approach provides stronger and more easily evidenced compliance than manual security processes.

How does secret scanning relate to CRA compliance?+

The CRA prohibits products from shipping with hardcoded credentials. Secret scanning in the DevSecOps pipeline detects hardcoded passwords, API keys, private keys, and certificates committed to source code — a prerequisite for ensuring the CRA's 'no default passwords' and authentication requirements are met. Secret scanning should be run on the full git history when first implemented, not just new commits, as historical commits may contain long-forgotten credentials that are still valid.

Can small manufacturers implement DevSecOps affordably?+

Yes. Many high-quality DevSecOps tools are open-source or have free tiers for small organisations. GitHub Advanced Security includes CodeQL, secret scanning, and Dependabot for free on public repositories. OWASP ZAP is free. Trivy and Grype for container scanning are open-source. Dependency-Track is open-source. A small manufacturer can build a functional CRA-oriented DevSecOps pipeline using these tools at minimal cost, with the primary investment being the engineering time to integrate and tune them.

Related terms

Secure Development Lifecycle (SDLC)A Secure Development Lifecycle (SDLC) is a software and product development process that integrates security activities — threat modelling, security requirements, code review, security testing — at every stage of development. CRA Annex I requires manufacturers to address security throughout the product development lifecycle.Secure by DesignSecure by design means that security is built into a product's architecture and development process from the earliest design stage, rather than added as an afterthought after development is complete. The EU Cyber Resilience Act's essential requirements in Annex I mandate a secure-by-design approach for all products with digital elements.Software Bill of Materials (SBOM)An SBOM is a formal, machine-readable inventory of all software components — including open-source libraries, third-party dependencies, and firmware packages — that make up a product. The EU Cyber Resilience Act requires manufacturers to maintain an SBOM as part of their technical documentation.Vulnerability ScanningVulnerability scanning is the automated process of probing systems, networks, or applications to identify known security weaknesses by comparing observed configurations and software versions against databases of known vulnerabilities. It provides continuous visibility into a product's security posture and supports the CRA's requirement that manufacturers monitor and address vulnerabilities throughout a product's lifecycle.

Browse the full CRA Compliance Checklist

See how DevSecOps fits into your complete CRA compliance programme.

View checklists →