Skip to content

Commit ad2150b

Browse files
committed
fix for acrolinx
1 parent e95e2bd commit ad2150b

1 file changed

Lines changed: 4 additions & 4 deletions

File tree

learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/8a-design-devsecops-processes.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
DevSecOps (Development, Security, and Operations) integrates security practices into every phase of the software development lifecycle. The Cloud Adoption Framework (CAF) Secure methodology provides structured guidance across six phasesstrategy, plan, ready, adopt, govern, and managethat maps directly to DevSecOps process design and aligns with the Microsoft Cloud Security Benchmark (MCSB) for specific technical controls. As a cybersecurity architect, you use these best practices to embed security from the earliest stages of development through deployment and operations.
1+
DevSecOps (Development, Security, and Operations) integrates security practices into every phase of the software development lifecycle. The Cloud Adoption Framework (CAF) Secure methodology provides structured guidance across six phasesstrategy, plan, ready, adopt, govern, and managethat maps directly to DevSecOps process design and aligns with the Microsoft Cloud Security Benchmark (MCSB) for specific technical controls. As a cybersecurity architect, you use these best practices to embed security from the earliest stages of development through deployment and operations.
22

33
## How the CAF Secure methodology supports DevSecOps
44

@@ -36,7 +36,7 @@ By establishing these principles at the strategy level, you create a consistent
3636

3737
### Define integrity and automation commitments
3838

39-
The Secure methodology's integrity strategy emphasizes automation for policy management, data classification, infrastructure deployments, and update management. When you commit to automation as a strategic objective, you set the expectation that manual security gates are replaced by automated controls embedded in CI/CD pipelinesincluding automated code scanning, compliance checks, deployment validation, and incident response.
39+
The Secure methodology's integrity strategy emphasizes automation for policy management, data classification, infrastructure deployments, and update management. When you commit to automation as a strategic objective, you set the expectation that manual security gates are replaced by automated controls embedded in CI/CD pipelinesincluding automated code scanning, compliance checks, deployment validation, and incident response.
4040

4141
The security sustainment strategy establishes continuous improvement as an organizational commitment, ensuring that DevSecOps processes include feedback loops, metrics tracking, and regular posture reviews rather than treating security as a one-time implementation.
4242

@@ -73,13 +73,13 @@ Before adopting new DevSecOps controls, the Secure methodology recommends unders
7373

7474
## Ready the cloud foundation for secure development
7575

76-
The Secure methodology's Ready guidance centers on building your cloud foundation through Azure landing zonesthe secure, scalable, modular design pattern that serves as the starting point for implementation. This phase bridges planning and adoption by establishing the foundational infrastructure, identity, and integrity mechanisms that DevSecOps controls depend on.
76+
The Secure methodology's Ready guidance centers on building your cloud foundation through Azure landing zonesthe secure, scalable, modular design pattern that serves as the starting point for implementation. This phase bridges planning and adoption by establishing the foundational infrastructure, identity, and integrity mechanisms that DevSecOps controls depend on.
7777

7878
### Build the foundation with Azure landing zones
7979

8080
The Ready guidance positions Azure landing zones as the primary mechanism for preparing your secure cloud estate:
8181

82-
- **Standardized architecture**: Landing zones separate domainssuch as development, staging, and productioninto governed environments with consistent security controls, ensuring that build agents, deployment pipelines, and developer workstations operate with appropriate isolation.
82+
- **Standardized architecture**: Landing zones separate domainssuch as development, staging, and productioninto governed environments with consistent security controls, ensuring that build agents, deployment pipelines, and developer workstations operate with appropriate isolation.
8383
- **Infrastructure as code deployment**: Deploy landing zones through IaC in CI/CD pipelines, applying the same safe deployment practices used for software deployments.
8484
- **Landing zone accelerators**: Use prepackaged, workload-specific deployments for services like Azure Kubernetes Service (AKS) and Azure API Management as security-compliant starting points.
8585
- **Design area coverage**: Even if you don't adopt a full enterprise landing zone, understand the design areas (identity, networking, governance, security, and others) and implement controls for each area.

0 commit comments

Comments
 (0)