Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why Penetration Testing for DevSecOps Drives ROI
Cybersecurity

Why Penetration Testing for DevSecOps Drives ROI

Robert WoodBy Robert WoodOctober 31, 2022Updated:October 31, 20224 Mins Read
Facebook Twitter LinkedIn Email
penetration testing
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Penetration testing or “pen testing” is an inherently manual process and runs in contrast to the DevSecOps movement. The DevSecOps movement is associated with outcomes such as automating everything, everything-as-code, CI/CD (continuous integration/continuous deployment) pipelines, and so on. When a pen test might take one to two weeks, where does it fit in? When should a team engage pen testers and how frequently? What should the new test triggers be? This article will explore these questions in more detail.

Fitting in a Pen Test

When a pen test and software release process are tightly coupled, the pen test inevitably slows it down. Rolling deployments are paradoxical with pausing everything for a pen test to occur.

In my experience, it’s useful to think about scheduling in a couple of ways:

  • Pause and test before significant releases into production — i.e. the initial product launch, major re-writes (if that is happening), or seasonal code freezes, such as holidays.
  • Allocating test environments that receive rolling deployments to have pen testing that occurs out-of-band.

New Test Triggers

This comes up frequently in regulated environments where it’s assumed by some that a certain amount of change amounts to a controls re-assessment. In that controls process re-assessment, a pen test or some other kind of security evaluation (or both) may be “required” for the team. This, in part, becomes a matter of interpretation, likely mapped back to a change control measure, ensuring that the changes being introduced to an environment don’t introduce some unknown or unacceptable level of risk to the assets involved.

Test Frequency

The higher risk of the application, the more frequently it should go through analysis. But that’s not a blanket rule; blanket rules are often not helpful in security and can be outright counterproductive. If the application is something that isn’t going through significant changes very frequently, but is very high risk, then a pen test would likely yield a low return on investment. If an application is backed up with good test coverage and complementary security activities such as dependency scanning, proactive threat modeling, static code analysis, and perhaps has an in-line web application firewall, then more frequent pen tests may yield a low return on investment.

Return on Investment

In the last section, I used the term return on investment (ROI) as part of the potential pen test decision criteria. Unless there is some verifiable regulatory requirement for conducting a particular security activity on a particular schedule, then the organization should be looking at the ROI of any given security activity. Just because pen testing is done quarterly works in one organization doesn’t mean the same results will translate in another.

What does return on investment mean in the context of pen testing? We can look at this in a few different ways:

  • Number and quality of results based on the cost of each test
  • Diversity of results from pen testing compared to other security activities such as static code analysis, threat modeling, or lighter-weight security-focused lifting (e.g., solutions like Semgrep)
  • Results identified per the number of resources invested to conduct the test (e.g., length of time spent testing, number of testers, etc.)
  • Coverage received from testing
  • Diversity of results from each test iteration. For example, if you’re doing tests quarterly yet finding 80% of the same issues or the same classes of issues then it’s likely time to re-invest your resources into remediation efforts or explore how your team could support a systematic prevention of a class of vulnerabilities that continues to affect you.

ROI may mean something totally different to you and your organization, but that’s okay. The above points are things that I’ve personally found useful in my own decision-making process over the years. The point is, that you’re being intentional with your decisions and the way you allocate resources. Just because something was once a good idea doesn’t mean it’s still a good idea and just because something works in another organization, doesn’t mean it will work in yours.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity devsecops featured risk Risk Management software
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Snowflake Expands AI Data Cloud to Revolutionize Automotive Manufacturing and Data Integration

May 14, 2025

Arvind Krishna’s Next IBM Miracle

May 13, 2025

ServiceNow Takes Major Steps Toward ‘Operating System of the Enterprise’ Destiny

May 13, 2025

Arvind Krishna Restoring IBM to Former Glory

May 13, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Snowflake Expands AI Data Cloud to Revolutionize Automotive Manufacturing and Data Integration
  • Arvind Krishna’s Next IBM Miracle
  • ServiceNow Takes Major Steps Toward ‘Operating System of the Enterprise’ Destiny
  • Arvind Krishna Restoring IBM to Former Glory
  • Apps Apocalypse: Bill McDermott Joins Satya Nadella in Saying AI Agents Will Crush Applications

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.