Security & Risk Management
Automated security scanning shifts security left, catching vulnerabilities during development rather than production—reducing risk and enabling faster, safer delivery.
Impact: Vulnerabilities found during development (not production), reduced MTTR for security issues, compliance with standards (OWASP, CWE), reduced incidents, faster threat response.
Level 1: Initial
Manual security reviews.
- Manual security reviews (late-stage, pre-production)
- No automated vulnerability scanning
- Security issues found in pre-production or production
- MTTR for critical issues: weeks to months
- No security checks in CI/CD
- Reactive security posture
Advancing to Level 2: Implement SAST (Static Application Security Testing) in CI, set up basic dependency scanning, configure security checks to run automatically, train team on security basics and common vulnerabilities, establish security issue tracking.
Resources: Security Overview · Shift-Left Security
Level 2: Managed
SAST in pipeline.
- SAST runs automatically in CI on every commit
- Basic dependency vulnerability scanning (SCA)
- Security issues found during development (shift-left begins)
- Some security checks in pipeline (not comprehensive)
- Security findings tracked and prioritized
- MTTR improving but not fast (days to weeks)
Advancing to Level 3: Add DAST (Dynamic Application Security Testing), implement secrets detection, add comprehensive SCA (all dependencies including transitive), implement security quality gates (block on critical issues), standardize security practices organization-wide.
Resources: DAST · Supply Chain Security · Quality Gates
Level 3: Defined
Comprehensive security automation.
- Comprehensive scanning: SAST, DAST, SCA, secrets detection
- Security quality gates enforce standards (block on critical issues)
- Automated security controls in pipeline
- Standardized security practices organization-wide
- Container/infrastructure scanning (if applicable)
- Security compliance automated (OWASP Top 10, CWE)
- MTTR: hours to days for critical issues
Advancing to Level 4: Implement security metrics tracking (MTTD, MTTR, vulnerability trends), apply risk-based prioritization (business context), track statistical process control, predict security issues based on patterns, correlate findings with business impact.
Resources: Security Remediation · SAST · Measuring Flow
Level 4: Quantified
Security metrics and risk-based prioritization.
- Security metrics tracked comprehensively (MTTD, MTTR, trends)
- Risk-based prioritization (business context and impact)
- Statistical process control applied
- Can predict security issues based on code patterns
- Correlation analysis (vulnerability types vs business impact)
- Data-driven security improvements
- MTTD <1 hour, MTTR <24 hours for critical
Advancing to Level 5: Implement proactive threat detection (threat modeling, predictions), continuous security process optimization (A/B testing), experiment with security approaches, share innovations with industry.
Resources: Measuring Flow
Level 5: Optimizing
Proactive threat detection.
- Proactive threat detection (threat modeling, predictive analysis)
- Continuous security process optimization (quarterly experiments)
- AI-assisted vulnerability detection and prioritization
- Industry leadership in security practices
- Community contributions (talks, papers, open source)
- Innovation in security automation
- MTTR near-zero for predicted threats
Maintaining: Stay current with security research and emerging threats, active community participation, regular experimentation with measurement, share learnings.
Level Assessment
You're at a level when:
- ✅ All characteristics consistently demonstrated organization-wide
- ✅ Capabilities are sustainable (not dependent on heroes)
- ✅ You possess the capability, not just working toward it
Level Distinctions:
- 1 → 2: SAST in pipeline (capability exists)
- 2 → 3: Comprehensive security suite with automated enforcement
- 3 → 4: Measure effectiveness, use risk-based prioritization
- 4 → 5: Proactive threat detection, continuous innovation
Dependencies:
- Depends on: Version Control Level 2+, CI/CD Level 2+
- Enables: Evidence Level 2+, all practices benefit from security integration
- Blocks: If weak (Level 1), vulnerabilities undetected until late stages
Tutorials | How-to Guides | Explanation | Reference
You are here: Explanation — understanding-oriented discussion that clarifies concepts.