Sonrai Security Releases Industry-First Risk Insights Engine 👉
Learn More
Search Login
Sonrai Security Logo
  • Product
    • Cloud Permissions FirewallA one-click solution to least privilege without disrupting DevOps.
    • CIEM +Discover, monitor & secure critical data.
    • Interactive TourExplore our products in a quick walkthrough.
      • Cloud Permissions Firewall Interactive Tour
A one-click solution to least privilege without disrupting DevOps.
      • CIEM + Interactive TourBreak toxic permission chains creating pathways to your data.
    • Start a 14- day free trial
    • Get Started
  • Solutions
        • Use Cases
          • Least Privilege
          • Third-Party Access
          • Just-in-Time Access
          • Privileged Access Management
          • Attack Path Disruption
          • Audit and Compliance
        • User Role
          • CloudOps
          • DevOps
          • Security
  • Pricing
  • Resources
        • Resource Library
        • Customer Stories
        • ACCESS
        • Blog
        • Webinars
        • Videos
        • From the research team
        • Cloud Permissions Firewall ROI
        • Identity Security Maturity Guide
        • ROI Calculator
        • Data Report: Cloud Access Risk
        • Get More Research
        • Read More
  • Customers
  • Company
    • About Us
      • Why Sonrai
      • Story & Leadership
      • Careers
      • News
    • Partners
      • Global System Integrators
      • Solution Providers
      • Empty Menu
    • Sign In Sign Up for Free
      Search Login
Sign In Sign Up for Free
Sonrai Security Logo
  • Product
    • Cloud Permissions FirewallA one-click solution to least privilege without disrupting DevOps.
    • CIEM +Discover, monitor & secure critical data.
    • Interactive TourExplore our products in a quick walkthrough.
      • Cloud Permissions Firewall Interactive Tour
A one-click solution to least privilege without disrupting DevOps.
      • CIEM + Interactive TourBreak toxic permission chains creating pathways to your data.
    • Start a 14- day free trial
    • Get Started
  • Solutions
        • Use Cases
          • Least Privilege
          • Third-Party Access
          • Just-in-Time Access
          • Privileged Access Management
          • Attack Path Disruption
          • Audit and Compliance
        • User Role
          • CloudOps
          • DevOps
          • Security
  • Pricing
  • Resources
        • Resource Library
        • Customer Stories
        • ACCESS
        • Blog
        • Webinars
        • Videos
        • From the research team
        • Cloud Permissions Firewall ROI
        • Identity Security Maturity Guide
        • ROI Calculator
        • Data Report: Cloud Access Risk
        • Get More Research
        • Read More
  • Customers
  • Company
    • About Us
      • Why Sonrai
      • Story & Leadership
      • Careers
      • News
    • Partners
      • Global System Integrators
      • Solution Providers
      • Empty Menu
    • Sign In Sign Up for Free
      Search Login

Interactive Product Tour

interactive tour Start a Tour Get a Demo
Search Login
Sonrai Security Logo
  • Product
    • Cloud Permissions FirewallA one-click solution to least privilege without disrupting DevOps.
    • CIEM +Discover, monitor & secure critical data.
    • Interactive TourExplore our products in a quick walkthrough.
      • Cloud Permissions Firewall Interactive Tour
A one-click solution to least privilege without disrupting DevOps.
      • CIEM + Interactive TourBreak toxic permission chains creating pathways to your data.
    • Start a 14- day free trial
    • Get Started
  • Solutions
        • Use Cases
          • Least Privilege
          • Third-Party Access
          • Just-in-Time Access
          • Privileged Access Management
          • Attack Path Disruption
          • Audit and Compliance
        • User Role
          • CloudOps
          • DevOps
          • Security
  • Pricing
  • Resources
        • Resource Library
        • Customer Stories
        • ACCESS
        • Blog
        • Webinars
        • Videos
        • From the research team
        • Cloud Permissions Firewall ROI
        • Identity Security Maturity Guide
        • ROI Calculator
        • Data Report: Cloud Access Risk
        • Get More Research
        • Read More
  • Customers
  • Company
    • About Us
      • Why Sonrai
      • Story & Leadership
      • Careers
      • News
    • Partners
      • Global System Integrators
      • Solution Providers
      • Empty Menu
    • Sign In Sign Up for Free
      Search Login

Interactive Product Tour

interactive tour Start a Tour Get a Demo
Search Login
Back to News
News

Sonrai CEO: Next Phase of DevSecOps Starts Now

By Sonrai Marketing
DevSecOps

View article in it’s entirety on securityboulevard.com

From Michael Vizard at SecurityBoulevard: “The first phase of DevSecOps was marked by getting more cybersecurity tools into the hands of developers. This next phase will be defined by integrated DevSecOps workflows created to address the unique attributes of cloud-native applications built microservices, Hannigan said.

As each microservice is constructed it becomes instantly possible to understand the security implications using a set of graph-based tools that not only discover the microservices but also surface all the potential security issues an organization consciously needs to approve. The core issue cybersecurity teams are contending with today is that given all the dependencies that exist between microservices, it’s not possible to know whether a microservice that has just been deployed has implicitly given any existing microservices permission to access data in ways that no one in the IT organization can easily see or comprehend.

Much of the current focus on DevSecOps is being driven by incidents involving, for example, S3 buckets on the Amazon Web Services (AWS) public cloud involving ports that have been left open due to misconfigurations that occurred when developers employed tools such as Terraform to automate the provisioning of infrastructure. When most application workloads were deployed in an on-premises IT environment, most infrastructure security issues were addressed by an internal cybersecurity team. Now that infrastructure is managed as code in the cloud by the developer, that review process has been effectively eliminated.”

Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on Linkedin
Previous Post Next Post
Sonrai Main Logo
  • Solutions
    • Cloud Permissions Firewall
    • CIEM
  • Why Sonrai
    • Interactive Tour
  • Platform Details
    • Free Trial
    • Pricing
  • Use Case
    • Least Privilege
    • Third-Party Access
    • Just-in-Time Access
    • Privileged Access Management
    • Attack Path Disruption
    • Audit & Compliance
  • User Roles
    • CloudOps
    • DevOps
    • Security
  • Learn
    • Resource Library
    • Customer Stories
    • Access Summit
    • Blog
    • Videos
    • Webinars
    • Cloud Permissions Firewall ROI
  • Company
    • Why Sonrai
    • Story & Leadership
    • Careers
    • News
    • Awards & Recognition
    • Contact us
  • Partners
    • Global System Integrators
    • Solution Providers
  • Link to Twitter
  • Link to Linkedin

© 2025 Sonrai Security. All rights reserved

Privacy Policy  |  

Sonrai cloud security platform, products and services are covered by U.S. Patent Nos. 10,728,307, 11,134,085, and 12,218,982, together with other domestic and international patents pending. All rights reserved.

Scroll to top