{"id":10087,"date":"2025-07-11T13:27:00","date_gmt":"2025-07-11T13:27:00","guid":{"rendered":"https:\/\/cyberwatch.fr\/?p=10087"},"modified":"2026-04-14T13:38:18","modified_gmt":"2026-04-14T13:38:18","slug":"switch-to-a-devsecops-approach-with-cyberwatch","status":"publish","type":"post","link":"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/","title":{"rendered":"Switch to a DevSecOps approach with Cyberwatch"},"content":{"rendered":"\n<p>Historically, DevOps is an approach that aims to improve collaboration between developers in order to accelerate application development, deployment, and maintenance cycles. It relies on automation, continuous integration (CI), and continuous deployment (CD) to ensure fast and efficient software delivery. Today, DevSecOps, which stands for Development, Security, and Operations, is a natural evolution of DevOps that is increasingly being adopted. This approach integrates security as a central element of the software development lifecycle, ensuring that security is taken into account from the design stage onwards.<\/p>\n\n\n\n<p>The key principles of DevSecOps:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Continuous integration of security<\/strong>: this pillar aims to include security from the start of development by integrating automated testing and analysis into the CI\/CD pipeline, ensuring early detection of vulnerabilities.<\/li>\n\n\n\n<li><strong>Automation of security controls:<\/strong> Automation enables vulnerabilities to be quickly identified and corrected by reducing human intervention, ensuring a smoother and more secure deployment of applications.<\/li>\n\n\n\n<li><strong>Ongoing collaboration between developers, operations, and security teams: <\/strong>A successful DevSecOps approach relies on a culture of collaboration where every development stakeholder considers security, promoting effective communication and shared responsibility.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How Cyberwatch can support you in the DevSecOps cycle of your environments<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">During the build\/CI phase<\/h3>\n\n\n\n<p>The build phase is the stage where a project&#8217;s source code is transformed into an executable element, often in the form of a Docker image. This phase is critical for integrating security controls upstream and preventing vulnerabilities from spreading to production environments.<\/p>\n\n\n\n<p>Cyberwatch intervenes at this stage as an external scanner to analyze Docker images and identify their vulnerabilities directly from a continuous integration (CI) chain, whether with GitLab CI\/CD or GitHub Actions.<\/p>\n\n\n\n<p><strong><u>Why integrate vulnerability scanning at the build stage?<\/u><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Early detection of flaws: images are scanned as soon as they are created, limiting the spread of vulnerabilities in subsequent environments.<\/li>\n\n\n\n<li>Automation of controls: each pipeline triggers an analysis without manual intervention, ensuring continuous monitoring.<\/li>\n\n\n\n<li>Blocking risky images: if critical vulnerabilities are detected, it is possible to prevent the deployment of non-compliant images.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Docker registry scanning<\/h3>\n\n\n\n<p>Once images are built and validated, they are stored, shared, and deployed from Docker registries. These registries, whether private or public, facilitate the management, monitoring, and deployment of images across different environments.<\/p>\n\n\n\n<p>However, vulnerabilities can appear over time on images that were initially compliant and are currently in production. To anticipate these risks, Cyberwatch provides continuous monitoring and performs regular scans of your images, enabling the detection of any new vulnerabilities that do not comply with your security policies.<\/p>\n\n\n\n<p>Thanks to this automated monitoring, you are immediately alerted if a critical vulnerability is discovered, allowing you to act quickly to apply the necessary corrective measures.<\/p>\n\n\n\n<p>With Cyberwatch, you can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Continuously list the images in your Docker registry;<\/li>\n\n\n\n<li>Automatically delete images that are no longer referenced in your registry;<\/li>\n\n\n\n<li>Continuously add and scan new images detected to identify potential vulnerabilities;<\/li>\n\n\n\n<li>Receive alerts based on your security criteria, immediately informing you if critical vulnerabilities appear.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Workshop: how to scan a Docker registry from Cyberwatch<\/h4>\n\n\n\n<p>Let&#8217;s imagine a widely used Docker registry, such as Harbor, where all of your organization&#8217;s images are stored. With Cyberwatch, you can launch a specific discovery on Harbor or any other registry:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"813\" height=\"153\" src=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/06\/1.png\" alt=\"Lancez une d\u00e9couverte sp\u00e9cifique sur Harbor ou tout autre registre avec Cyberwatch\" class=\"wp-image-8753\" srcset=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/06\/1.png 813w, https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/06\/1-480x90.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 813px, 100vw\" \/><figcaption class=\"wp-element-caption\">Run a specific search on Harbor or any other registry using Cyberwatch<\/figcaption><\/figure>\n\n\n\n<p>When configuring a discovery, you can define the Docker registry to be analyzed and enable automatic recording of detected images.<\/p>\n\n\n\n<p>In addition, Cyberwatch allows you to automatically delete assets on Cyberwatch that correspond to images that are no longer present in the registry, ensuring that your inventory is always up to date.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e9decbc1b5c&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e9decbc1b5c\" class=\"wp-block-image aligncenter size-full wp-lightbox-container\"><img decoding=\"async\" width=\"993\" height=\"396\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/management-discovered-assets-docker.png\" alt=\"\" class=\"wp-image-10088\" srcset=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/management-discovered-assets-docker.png 993w, https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/management-discovered-assets-docker-980x391.png 980w, https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/management-discovered-assets-docker-480x191.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 993px, 100vw\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p>Once the discovery is complete, if the automatic recording option has been enabled, the detected images will be added directly to Cyberwatch, where they will be analyzed to identify any vulnerabilities. This discovery can be performed periodically by Cyberwatch, which will ensure that the inventory remains consistent with the actual state of the registry and report any vulnerabilities found.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e9decbc20b2&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e9decbc20b2\" class=\"wp-block-image aligncenter size-large wp-lightbox-container\"><img decoding=\"async\" width=\"1024\" height=\"250\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/discovered-assets-docker-1024x250.png\" alt=\"\" class=\"wp-image-10091\" srcset=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/discovered-assets-docker-980x240.png 980w, https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/discovered-assets-docker-480x117.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p>In order to stay informed of new vulnerabilities identified by these analyses, it is also recommended that you set up alerts, which can be configured for Docker images, and which will email you a list of impactful vulnerabilities according to your prioritization criteria.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Harbor scan<\/h3>\n\n\n\n<p>In the previous section, we explored how to monitor a Docker registry directly from Cyberwatch. However, in the case of Harbor, the subject can be approached from the other direction, scanning Docker images directly from Harbor using Cyberwatch as an external vulnerability scanner.<\/p>\n\n\n\n<p>In practical terms, you will be able to run a vulnerability scan and view the results directly from the Harbor interface. This configuration improves the automation and security analysis of images, with the aim of quickly detecting vulnerabilities.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Workshop: how to add Cyberwatch as an external vulnerability scanner<\/h4>\n\n\n\n<p>The procedure is described in full <a href=\"https:\/\/docs.cyberwatch.com\/help\/en\/use_assets\/harbor_scan\/\" target=\"_blank\" rel=\"noreferrer noopener\">in the documentation<\/a>.<\/p>\n\n\n\n<p>The first step is to configure Cyberwatch as a vulnerability scanner on Harbor. The configuration elements, including the necessary API and authentication keys, can be obtained from the Cyberwatch administration section.<\/p>\n\n\n\n<p>Once the scanner is configured, it can be selected by default:<\/p>\n\n\n\n<p>This way, still from the Harbor interface, you can run a vulnerability scan on the desired images and get the results directly.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Information sharing, exports, and metrics<\/h2>\n\n\n\n<p>In a DevSecOps approach, the management, processing, and relevant sharing of information are as important as risk and vulnerability analysis.<\/p>\n\n\n\n<p>Indeed, even the most optimal analysis is only effective if the information is properly disseminated to stakeholders. The ability to extract, structure, and exploit the results of analyses makes it possible to optimize the remediation of vulnerabilities and ensure effective monitoring of the security measures put in place.<\/p>\n\n\n\n<p>To facilitate this management, Cyberwatch offers several mechanisms for retrieving and viewing data:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Export generation: different types of exports can be generated from Cyberwatch, such as management summaries, detailed technical reports, or raw information reports on an asset, a scope of assets, or the entire fleet.<\/li>\n\n\n\n<li>Alert setup: you can be notified automatically by email, via a webhook, or directly on Teams when critical vulnerabilities are detected and\/or according to your own criteria.<\/li>\n\n\n\n<li>Kibana: The <a href=\"https:\/\/www.elastic.co\/kibana\" target=\"_blank\" rel=\"noreferrer noopener\">Kibana<\/a> tool is automatically integrated into Cyberwatch, with pre-configured and customizable dashboards for tracking security metrics.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">To go further<\/h2>\n\n\n\n<p>Want to scan your Docker images before they are even deployed to your registry?<\/p>\n\n\n\n<p>We will soon be publishing an article to show you how to integrate Cyberwatch vulnerability scanning into a CI\/CD pipeline, in order to identify vulnerabilities as early as the build phase!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Historically, DevOps is an approach that aims to improve collaboration between developers in order to accelerate application development, deployment, and maintenance cycles. It relies on automation, continuous integration (CI), and continuous deployment (CD) to ensure fast and efficient software delivery. Today, DevSecOps, which stands for Development, Security, and Operations, is a natural evolution of DevOps [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":10094,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[29],"tags":[],"class_list":["post-10087","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Switch to a DevSecOps approach with Cyberwatch - Cyberwatch<\/title>\n<meta name=\"description\" content=\"DevSecOps enables the integration of security as a central component of the software development lifecycle. Read more...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Switch to a DevSecOps approach with Cyberwatch - Cyberwatch\" \/>\n<meta property=\"og:description\" content=\"DevSecOps enables the integration of security as a central component of the software development lifecycle. Read more...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberwatch\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-11T13:27:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-14T13:38:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-devsecops.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1953\" \/>\n\t<meta property=\"og:image:height\" content=\"1015\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Amine Ait Kaci\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amine Ait Kaci\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/switch-to-a-devsecops-approach-with-cyberwatch\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/switch-to-a-devsecops-approach-with-cyberwatch\\\/\"},\"author\":{\"name\":\"Amine Ait Kaci\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#\\\/schema\\\/person\\\/d7f6fdaa8c12687dbfaac2822287e3d3\"},\"headline\":\"Switch to a DevSecOps approach with Cyberwatch\",\"datePublished\":\"2025-07-11T13:27:00+00:00\",\"dateModified\":\"2026-04-14T13:38:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/switch-to-a-devsecops-approach-with-cyberwatch\\\/\"},\"wordCount\":1083,\"publisher\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/switch-to-a-devsecops-approach-with-cyberwatch\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/thumbnail-devsecops.png\",\"articleSection\":[\"news\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/switch-to-a-devsecops-approach-with-cyberwatch\\\/\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/switch-to-a-devsecops-approach-with-cyberwatch\\\/\",\"name\":\"Switch to a DevSecOps approach with Cyberwatch - Cyberwatch\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/switch-to-a-devsecops-approach-with-cyberwatch\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/switch-to-a-devsecops-approach-with-cyberwatch\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/thumbnail-devsecops.png\",\"datePublished\":\"2025-07-11T13:27:00+00:00\",\"dateModified\":\"2026-04-14T13:38:18+00:00\",\"description\":\"DevSecOps enables the integration of security as a central component of the software development lifecycle. Read more...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/switch-to-a-devsecops-approach-with-cyberwatch\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/switch-to-a-devsecops-approach-with-cyberwatch\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/switch-to-a-devsecops-approach-with-cyberwatch\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/thumbnail-devsecops.png\",\"contentUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/thumbnail-devsecops.png\",\"width\":1953,\"height\":1015},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/switch-to-a-devsecops-approach-with-cyberwatch\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Switch to a DevSecOps approach with Cyberwatch\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/\",\"name\":\"Cyberwatch\",\"description\":\"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#organization\",\"name\":\"Cyberwatch\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo_simple_black.png\",\"contentUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo_simple_black.png\",\"width\":1883,\"height\":500,\"caption\":\"Cyberwatch\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#\\\/schema\\\/person\\\/d7f6fdaa8c12687dbfaac2822287e3d3\",\"name\":\"Amine Ait Kaci\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8533d8753c0f52656768b416ecc446762a20dc62fd6f416a8b07362a4a34d91c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8533d8753c0f52656768b416ecc446762a20dc62fd6f416a8b07362a4a34d91c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8533d8753c0f52656768b416ecc446762a20dc62fd6f416a8b07362a4a34d91c?s=96&d=mm&r=g\",\"caption\":\"Amine Ait Kaci\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Switch to a DevSecOps approach with Cyberwatch - Cyberwatch","description":"DevSecOps enables the integration of security as a central component of the software development lifecycle. Read more...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/","og_locale":"en_US","og_type":"article","og_title":"Switch to a DevSecOps approach with Cyberwatch - Cyberwatch","og_description":"DevSecOps enables the integration of security as a central component of the software development lifecycle. Read more...","og_url":"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/","og_site_name":"Cyberwatch","article_published_time":"2025-07-11T13:27:00+00:00","article_modified_time":"2026-04-14T13:38:18+00:00","og_image":[{"width":1953,"height":1015,"url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-devsecops.png","type":"image\/png"}],"author":"Amine Ait Kaci","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Amine Ait Kaci","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/#article","isPartOf":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/"},"author":{"name":"Amine Ait Kaci","@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/person\/d7f6fdaa8c12687dbfaac2822287e3d3"},"headline":"Switch to a DevSecOps approach with Cyberwatch","datePublished":"2025-07-11T13:27:00+00:00","dateModified":"2026-04-14T13:38:18+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/"},"wordCount":1083,"publisher":{"@id":"https:\/\/cyberwatch.fr\/en\/#organization"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-devsecops.png","articleSection":["news"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/","url":"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/","name":"Switch to a DevSecOps approach with Cyberwatch - Cyberwatch","isPartOf":{"@id":"https:\/\/cyberwatch.fr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/#primaryimage"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-devsecops.png","datePublished":"2025-07-11T13:27:00+00:00","dateModified":"2026-04-14T13:38:18+00:00","description":"DevSecOps enables the integration of security as a central component of the software development lifecycle. Read more...","breadcrumb":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/#primaryimage","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-devsecops.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/thumbnail-devsecops.png","width":1953,"height":1015},{"@type":"BreadcrumbList","@id":"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberwatch.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Switch to a DevSecOps approach with Cyberwatch"}]},{"@type":"WebSite","@id":"https:\/\/cyberwatch.fr\/en\/#website","url":"https:\/\/cyberwatch.fr\/en\/","name":"Cyberwatch","description":"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.","publisher":{"@id":"https:\/\/cyberwatch.fr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberwatch.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberwatch.fr\/en\/#organization","name":"Cyberwatch","url":"https:\/\/cyberwatch.fr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","width":1883,"height":500,"caption":"Cyberwatch"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/person\/d7f6fdaa8c12687dbfaac2822287e3d3","name":"Amine Ait Kaci","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8533d8753c0f52656768b416ecc446762a20dc62fd6f416a8b07362a4a34d91c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8533d8753c0f52656768b416ecc446762a20dc62fd6f416a8b07362a4a34d91c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8533d8753c0f52656768b416ecc446762a20dc62fd6f416a8b07362a4a34d91c?s=96&d=mm&r=g","caption":"Amine Ait Kaci"}}]}},"_links":{"self":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts\/10087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/comments?post=10087"}],"version-history":[{"count":1,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts\/10087\/revisions"}],"predecessor-version":[{"id":10097,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts\/10087\/revisions\/10097"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/media\/10094"}],"wp:attachment":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/media?parent=10087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/categories?post=10087"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/tags?post=10087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}