Capstone - DevSecOps Pipeline
Author: Damien Burks
Welcome to the Capstone Project of the DevSecOps section! This is where everything you’ve learned, such as application security, the secure SDLC, and DevSecOps fundamentals, comes together into one powerful, automated pipeline.
In this capstone, you’ll build your own End-to-End Application DevSecOps Pipeline, a hands-on project that demonstrates your ability to integrate and automate security throughout the entire software development lifecycle (SDLC).
Overview
The goal of this capstone is to design and implement a fully functional, application-centric DevSecOps pipeline that enforces security at every stage, from code commit to deployment. You’ll simulate what real-world engineering teams do: integrate static analysis, dependency checks, runtime testing, and secret scanning all through CI/CD automation.
In short, this project highlights how security can be developer-friendly, automated, and actionable, ensuring vulnerabilities are caught early and fixed fast.
Pipeline Breakdown
Your DevSecOps pipeline will include four key security layers:
- Code Security (SAST + SCA) – Detect vulnerabilities in your source code and dependencies before deployment.
- Runtime Security (DAST) – Test your running application for real-world exploit paths.
- Secrets & Configuration Management – Prevent accidental credential exposure in your codebase and pipeline.
- Continuous Feedback & Reporting – Provide visibility to developers through reports, badges, and notifications.
You'll bring it all together by doing all of the tasks below.
If you're looking for a great place or example to start from, check out the GitHub Actions DevSecOps Pipeline that has been developed by the DSB Community.
Capstone Tasks
Phase 1 – Code Security (SAST + SCA)
Focus on securing your codebase and open-source dependencies. To make this happen, you'll want to:
- Integrate SAST using Semgrep, SonarQube, or CodeQL.
- Add SCA (Software Composition Analysis) using Trivy, Snyk, or OWASP Dependency-Check.
- Configure both to run automatically on each pull request or code push.
✅ Deliverable: A CI/CD stage that fails builds on high-severity vulnerabilities and reports findings in PR comments or pipeline logs.
Phase 2 – Runtime Security (DAST)
Simulate attacks to identify vulnerabilities in your deployed application. To make this happen, you'll want to:
- Deploy your app locally or within a test container.
- Use OWASP ZAP, Nikto, or StackHawk for dynamic scanning.
- Archive results for visibility and trend tracking.
✅ Deliverable: A DAST stage that runs after deployment and generates reports in your pipeline output.