DevSecOps
DevSecOps is the practice of integrating security tools, testing, and responsibilities throughout the software development and operations pipeline — making security a shared responsibility of development, security, and operations teams rather than a final-stage gate. DevSecOps operationalises the CRA's SDLC requirements in modern continuous delivery environments.
DevSecOps is the practice of integrating security tools, testing, and responsibilities throughout the software development and operations pipeline — making security a shared responsibility of development, security, and operations teams rather than a final-stage gate. DevSecOps operationalises the CRA's SDLC requirements in modern continuous delivery environments.
Product Security EngineeringWhat Is DevSecOps?
DevSecOps extends the DevOps practice of integrating development and operations by adding security as a core, automated component of the development pipeline. In a DevSecOps model, security testing (SAST, DAST, SCA), security configuration validation, and secret scanning are all automated and run on every code commit or build — security is 'shifted left' into the development process rather than being a separate audit gate. The goal is to detect security issues early, when they are cheapest to fix, and to prevent known vulnerability classes from ever reaching production. For manufacturers of CRA-covered products, DevSecOps provides the technical infrastructure to operationalise the SDLC obligations required by Annex I without creating bottlenecks in release velocity.
Key DevSecOps Controls for CRA Manufacturers
A CRA-aligned DevSecOps pipeline should incorporate the following automated security controls:
- SAST (Static Application Security Testing): Analyses source code and binaries for known vulnerability patterns (CWE instances). Tools: Semgrep, CodeQL, Coverity, SonarQube.
- SCA (Software Composition Analysis): Identifies known CVEs in third-party dependencies and generates the SBOM. Tools: Dependency-Track, Snyk, FOSSA, Syft.
- Secret scanning: Detects hardcoded credentials, API keys, and cryptographic material committed to source code. Tools: Gitleaks, Trufflehog, GitHub Advanced Security.
- DAST (Dynamic Application Security Testing): Tests running applications for exploitable vulnerabilities through automated attack simulation. Tools: OWASP ZAP, Burp Suite (automated).
- Container scanning: Analyses container images for OS and application vulnerabilities. Tools: Trivy, Grype, Snyk Container.
- Infrastructure-as-code scanning: Detects misconfiguration in deployment infrastructure. Tools: Checkov, tfsec.
DevSecOps Pipeline Architecture for CRA
A practical DevSecOps architecture for a CRA-covered product manufacturer typically stages security controls through the pipeline:
Pre-commit (developer workstation): IDE plugins for SAST linting; secret scanning on git commit hooks.
CI pipeline (on every pull request): SAST scan of changed code; SCA scan with SBOM update; secret scanning; unit tests including security-relevant cases.
Build pipeline (on merge to main): Full SCA scan; container scanning; SBOM generation and signing; policy gate (fail build on new Critical findings without approved exception).
Release pipeline (on release candidate): DAST scan of integration environment; firmware binary analysis; SBOM publishing to Dependency-Track; security sign-off checkpoint.
Post-release monitoring: Dependency-Track continuous CVE monitoring; EPSS score monitoring for SBOM components; alert to PSIRT on new Critical findings.
DevSecOps Culture and Shared Responsibility
DevSecOps is as much a cultural shift as a tooling change. The core principle is that security is everyone's responsibility — developers own the security of the code they write; security engineers provide tooling, guidance, and triage support; operations teams are responsible for secure deployment and monitoring. For CRA manufacturers, this means:
- Security training for all developers, not just a dedicated security team.
- Security champions in each development team who are the primary contact for security questions.
- Published secure coding guidelines specific to the technology stack.
- Blameless security retrospectives that treat security findings as learning opportunities.
- Metrics that track security debt (number of open vulnerabilities by severity) alongside feature velocity.
CRA compliance requires documentation that security was addressed throughout development. DevSecOps provides the pipeline artifacts — scan reports, SBOM records, policy gate outcomes — that constitute this evidence.
CVD Portal makes DevSecOps compliance straightforward.
Public CVD submission portal, acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for EU manufacturers.
Start your free portalFrequently asked
Is DevSecOps required for CRA compliance or just recommended?+
The CRA requires that manufacturers integrate security throughout the product development lifecycle — this is the substance of the SDLC obligation in Annex I. DevSecOps is the modern operationalisation of this requirement in continuous delivery environments. A manufacturer using a traditional waterfall development process with separate security testing phases can also comply with the CRA, provided security is genuinely addressed. However, DevSecOps's automated, continuous approach provides stronger and more easily evidenced compliance than manual security processes.
How does secret scanning relate to CRA compliance?+
The CRA prohibits products from shipping with hardcoded credentials. Secret scanning in the DevSecOps pipeline detects hardcoded passwords, API keys, private keys, and certificates committed to source code — a prerequisite for ensuring the CRA's 'no default passwords' and authentication requirements are met. Secret scanning should be run on the full git history when first implemented, not just new commits, as historical commits may contain long-forgotten credentials that are still valid.
Can small manufacturers implement DevSecOps affordably?+
Yes. Many high-quality DevSecOps tools are open-source or have free tiers for small organisations. GitHub Advanced Security includes CodeQL, secret scanning, and Dependabot for free on public repositories. OWASP ZAP is free. Trivy and Grype for container scanning are open-source. Dependency-Track is open-source. A small manufacturer can build a functional CRA-oriented DevSecOps pipeline using these tools at minimal cost, with the primary investment being the engineering time to integrate and tune them.
Related terms
Browse the full CRA Compliance Checklist
See how DevSecOps fits into your complete CRA compliance programme.