+44 (0) 3333 445 286 [email protected]

Subtotal: £0.00

No products in the basket.

Five or so years ago when I began my own DevOps journey I had a sense of the potential gains we could make but there weren’t any success stories or data from companies like ours at that time. I understood the what and the why although my why at the time was to gain the trust of our business partners because I felt it was badly damaged after years of under delivering on our promises. As a servant leader I understood the cultural aspects and our team, after some initial heavy lifting, we started to see some tremendous gains in speeding up our daily work through automation and in turn freed us up to be more productive. We were even partnering with security back then as it just seemed obvious to me that we had to get them onboard.

Today, there are numerous success stories from all sorts of companies including old, highly regulated, Fortune 100 companies that look and feel like worse case scenarios for DevSecOps. Their stories and the personal journeys of DevSecOps practitioners give us concrete examples of the kinds of gains you can expect to see on your own journey. The numbers are compelling reasons to embark on your own DevSecOps journey if you haven’t already.

Some of my favorite example come from our own customers whom I’ve witnessed launch and roll our DevSecOps initiatives over the last few years.

A financial services company that had 800 open source components under management in their manual approval process that took three weeks adopted our Firewall solution to automate that process. They deleted all of the components in their Nexus Repository and started re-running their build with Firewall turned on and 30 days later discovered:

  • They actually had 19,000 open source components flowing into those builds, 850 of which were automatically quarantined in an approval process that now took less than 3 seconds saving them 54,000 man hours along the way.
  • More broadly, their DevSecOps initiative saw software quality go up over 40% while developer productivity go up by 30% thanks to early feedback from shifting that feedback to the left.

There is so much focus on shifting left and empowering developers that it is easy to overlook the impact operations and security teams are enjoying all the way to the right, in production. Putting a high quality, secure application in production is a great start but what happens when a Zero-day vulnerability is announced? The last couple of years has seen several nasty vulnerabilities announced that have led directly to well-known data breaches. When I talk to our customer about how our solutions help in their Priority Incident Response Teams (PSIRT) the answers all tend to be the same:

  • We were able to immediately answer the first question we’re faced with, are we impacted? If so, which apps and what data is at risk. Prior to having the ability to track and trace open source components like this we would have to had relied on end-point server scanning which can take weeks just to finish this discovery.
  • One particularly noteworthy example was when a CISO, upon learning about an impacted app from one of last years struts vulnerabilities, decided to pull-the-plug on one of their apps sitting on particularly sensitive data. This was the same vulnerability that impacted Equifax, the Canadian IRS and several others.

The above examples are real world proof of the types of gains so many teams are seeing in a variety of industries. The stories have been rolling in for years now and showed be a big enough carrot for organisations to be running toward DevSecOps if they’re not already. If, for some reason, they’re still not enough, let me offer you this stick.



Depending on which accounting you read it took either 2 or 3 days for an exploit to happen after the vulnerability was announced. This was a fairly big reduction in the amount of time attackers were able to weaponize a new known vulnerability. The chart below shows the average time for such weaponization over the years.



I recall from my earlier days working under the assumption we had 30 days before vulnerabilities with CVSS scores of 9 or 10 were turned into exploits. In 2015 that number was down to 15 days and then, in 2017, the exploit was out in 3 days! Initially, I was skeptical, an assumed this was a one-off and couldn’t be the new norm until I saw this article.

For more on DevSecOps, keep checking our DevOps page.

About the Author:

Curtis Yanko is a Director of Strategy at Sonatype and a DevSecOps coach/evangelist. Prior to coming to Sonatype, Curtis started the DevOps Center of Enablement at a Fortune 100 insurance company and chaired an Open Source Governance Committee. When he isn’t working with customers and partners on how to accelerate delivery by building security and governance into CI/CD pipelines, he can be found raising service dogs or out playing ultimate frisbee during his lunch hour. Curtis is currently working on building strategic technical partnerships to help solve for the DevSecOps toolchain.