
DevSecOps Pipeline Checklist → are you doing enough for security in CI/CD?
AlibhaAugust 13, 2025
If It Builds, It Should Be Secure
Let’s be honest, your CI/CD pipeline probably wasn’t designed with security in mind. It was built to ship fast, to keep developers happy, and to support constant change. That’s okay. Most pipelines start like that. But now you’re getting bigger. Or audited. Or breached. Or you’re just tired of waking up to Slack messages about another CVE in production. We get it. The promise of DevSecOps is great, but in reality? It often feels like:- Tool overload without actual visibility
- Endless false positives from scans
- Devs ignoring security tickets
- Broken integrations no one knows about
- And no clear idea of how secure your pipeline really is
The DevSecOps Pipeline Checklist
Security doesn’t fail because teams don’t care -it fails because no one’s checking the plumbing. You’ve got SAST. You’ve got SCA. You’ve got secret scanning. But is it working? Does it block? Who gets the alert? Is anyone fixing the tickets? This checklist helps you:- Spot invisible failures (like unactioned scan results)
- Catch misconfigurations, no tool will flag
- Benchmark your security maturity
- Prioritize fixes that matter
1. Source Code Security Controls
Your code repo is the beginning of every build -and every potential breach.- Are all repositories private and access-controlled?
- Are branch protection rules enforced (e.g., no direct push to main)?
- Is commit signing enabled for your team?
- Are all changes gated by mandatory pull/merge requests?
- Is code scanned for secrets or misconfigs before merging?
- Are old or abandoned repos archived or deleted?
2. Secrets Detection & Management
No one plans to hardcode secrets. But it happens -and attackers know it.- Is secret scanning integrated into Git hooks or CI?
- Are leaked secrets auto-revoked or alerted instantly?
- Are secrets stored in a dedicated vault (e.g., HashiCorp, AWS Secrets Manager)?
- Is runtime injection used instead of baking secrets into images?
- Are access tokens and API keys regularly rotated?
3. Static Application Security Testing (SAST)
SAST catches security issues before your code runs -but only if it's used right.- Is SAST triggered on every commit or PR?
- Are the results shown inside the PR to avoid context-switching?
- Are high-confidence findings auto-ticketed or assigned?
- Can devs triage false positives easily?
- Are scan policies enforced before merging?
4. Software Composition Analysis (SCA)
You trust your code. Can you say the same for the 400 OSS packages you imported?- Are all dependencies scanned for known CVEs (including transitive ones)?
- Is license compliance part of your checks (GPL, MIT, etc.)?
- Are packages pinned to specific versions?
- Are automated PRs for updates enabled (e.g., Dependabot)?
- Is there a policy for removing deprecated libraries?
5. Build System Integrity
Your build system is where your trusted code becomes a shippable product. It’s also a juicy target.- Are builds done in ephemeral or sandboxed environments?
- Are build artifacts signed and checksummed?
- Are failed builds blocked from deployment?
- Are CI/CD runners access-controlled and patched?
- Can you reproduce builds consistently?
6. Container Security (if you use Docker/K8s)
If your apps run in containers, the image becomes your new attack surface.- Are base images scanned for CVEs regularly?
- Are containers run as non-root users?
- Are image scans blocking deployments if critical issues are found?
- Is there a process to rebuild images when dependencies are patched?
- Are image registries access-controlled?
7. Dynamic Application Security Testing (DAST)
You’ve built and shipped your app. Now test how it holds up under attack.- Is DAST part of your staging or pre-prod pipeline?
- Are authenticated scans supported (login flows, session handling)?
- Are findings prioritized and routed to responsible teams?
- Are tests configured to avoid false alarms or service disruption?
- Are scan results trend-tracked over time?
8. Infrastructure as Code (IaC) Scanning
IaC is powerful -but it can also codify bad decisions at scale.- Are Terraform, CloudFormation, or Helm files scanned pre-merge?
- Are misconfigurations flagged, like open ports or overly permissive roles?
- Are approved modules reused across projects?
- Is IaC version-controlled and peer-reviewed?
- Are security scans part of the PR review process?
9. Access Controls & Audit Logs
If you don’t know who can do what -and when they did it -you’ve already lost.- Is CI/CD access scoped by roles, teams, or projects?
- Are admin rights granted only when needed (and logged)?
- Are service accounts reviewed and rotated regularly?
- Is all CI/CD activity logged, searchable, and retained?
- Are logs monitored for suspicious behavior (e.g., failed deploys, access at odd hours)?
10. Ticketing & Alerting Integration
It’s not enough to detect. Someone has to fix.- Are security findings automatically ticketed with ownership tags?
- Are tickets prioritized by risk and exploitability, not just CVSS?
- Are there SLA policies for remediation (e.g., criticals in 7 days)?
- Are alerts integrated with Slack, email, or SIEMs?
- Are recurring issues reviewed in retrospectives or security reviews?
So… How’d Your Pipeline Score?
If you made it this far and checked off most of the boxes -that’s genuinely impressive. You’re ahead of the curve, and your security posture is likely stronger than most. But if you found yourself skipping a few sections… or thinking, “Wait… I’m not sure we’ve got this wired in yet.” You’re definitely not alone. Most DevOps and AppSec teams are somewhere in the middle. There’s a lot going on -sprint deadlines, infrastructure changes, team handovers -and it’s easy for security coverage to become “good enough” instead of “complete and verified.” Here’s the thing: You don’t need perfection. You need visibility, prioritization, and a plan to improve. That’s what this checklist gives you a clear view of where things stand and where the risk gaps live.Ready to Take It Further?
We’ve worked with engineering and security teams who’ve used this exact checklist to identify:- Secrets silently leaking into Git repositories
- Vulnerabilities flagged by scanners but never reaching developers
- Unscanned base images running in production
- SAST tools produce findings that no one actually triages
- Broken integrations that went unnoticed for months
Turning Checklist Insights into Real-World Security
Running through this checklist gives you a snapshot of where your pipeline stands. But to operationalize that visibility across every tool, team, and ticketing workflow, you need a central source of truth. Strobes ASPM helps teams take the next step by:- Aggregating findings from all security tools -SAST, SCA, DAST, IaC, Secrets, and more
- Prioritizing vulnerabilities based on context, asset exposure, and business impact
- De-duplicating and correlating results to reduce alert fatigue
- Routing actionable issues directly to the right developers via Jira, GitHub, Azure DevOps, or Slack
- Providing continuous visibility into remediation timelines and bottlenecks
Let's Walk Through Your Pipeline Together
If you’ve gone through this checklist and found areas of concern - or even just uncertainty - let’s talk. We’ll take 15 minutes to:- Walk through your current DevSecOps setup
- Benchmark your pipeline security maturity
- Show you how ASPM can tie everything together -without disrupting your existing workflows