Scaling Threat Modeling Effectively in Agile DevSecOps

Authors

  • Pavan Paidy Senior Application Security Engineer at FINRA, USA Author

Keywords:

Agile, DevSecOps, Threat Modeling, Secure SDLC

Abstract

Threat modeling has become a fundamental component of modern software security, especially in the interesting topic of Agile DevSecOps. The problem is not identifying the need for threat modeling but rather in correctly scaling it across agile, cross-functional teams as development teams desire to add security earlier and more dynamically into their operations. Agile settings are intrinsically dynamic, marked by fast iterations, continuous delivery, and dispersed decision-making that sometimes causes conventional security solutions to lag behind. This work explores the adaptation and scaling of threat modeling to efficiently operate within these restrictions, guaranteeing that security is a basic, non-disruptive component of the development life. We stress the particular advantages of correctly scaling threat modeling: early identification of possible vulnerabilities, support of a security-centric mentality, minimization of rework, and faster delivery of more secure systems. Examined are numerous strategies and frameworks, including lightweight and automated solutions that match Agile ideals, like incremental threat modeling, integration with CI/CD pipelines, and the usage of collaboration tools. We investigate as basic drivers of scalable threat modeling cultures the relevance of security advocates, developer empowerment, and training. This article emphasizes practical lessons, confronted problems, and quantifiable results by means of a case study from a mid-sized technology company including threat modeling into its Agile DevSecOps process. With the right balance of automation, teamwork, and cultural support, the study finally contends that threat modeling may be efficiently scaled—not as a barrier but rather as a stimulant for producing safe, high-quality software in Agile DevSecOps contexts.

Downloads

Download data is not yet available.

References

Ahmed, A. M. A. A. DevSecOps: Enabling security by design in rapid software development. MS thesis. 2019.

Zunnurhain, Kazi, and Saniora R. Duclervil. "A new project management tool based on devsecops." 2019 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2019.

Jawed, Mohammed. Continuous security in DevOps environment: Integrating automated security checks at each stage of continuous deployment pipeline. Diss. Wien, 2019.

Ahmed, Zaheeruddin, and Shoba C. Francis. "Integrating security with devsecops: Techniques and challenges." 2019 International Conference on Digitization (ICD). IEEE, 2019.

Maclean, Louis. "Scaling DevOps in Large Enterprises: Challenges and Solutions." (2019).

Yasodhara Varma Rangineeni. “End-to-End MLOps: Automating Model Training, Deployment, and Monitoring”. JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), vol. 7, no. 2, Sept. 2019, pp. 60-76

. Tomas, Nora, Jingyue Li, and Huang Huang. "An empirical study on culture, automation, measurement, and sharing of devsecops." 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE, 2019.

Nguyen, Jessica, and Marc Dupuis. "Closing the feedback loop between UX design, software development, security engineering, and operations." Proceedings of the 20th Annual SIG Conference on Information Technology Education. 2019.

Myrbakken, Håvard, and Ricardo Colomo-Palacios. "DevSecOps: a multivocal literature review." Software Process Improvement and Capability Determination: 17th International Conference, SPICE 2017, Palma de Mallorca, Spain, October 4–5, 2017, Proceedings. Springer International Publishing, 2017.

Mohammed, Ibrahim Ali. "An empirical study of the importance of DevOps strategies and approaches in information management systems." International Journal of Current Science (IJCSPUB) www. ijcspub. org, ISSN (2015): 2250-1770.

Jackson, Kevin L., and Scott Goessling. Architecting Cloud Computing Solutions: Build cloud strategies that align technology and economics while effectively managing risk. Packt Publishing Ltd, 2018.

Ur Rahman, Akond Ashfaque, and Laurie Williams. "Software security in DevOps: synthesizing practitioners' perceptions and practices." Proceedings of the international workshop on continuous software evolution and delivery. 2016.

Bell, Laura, et al. Agile application security: enabling security in a continuous delivery pipeline. " O'Reilly Media, Inc.", 2017.

Kupunarapu, Sujith Kumar. "AI-Enabled Remote Monitoring and Telemedicine: Redefining Patient Engagement and Care Delivery." International Journal of Science And Engineering 2.4 (2016): 41-48.

Sandén, Oscar. "Threat Management in Agile Organisations: Using the Results of a Threat Analysis in Agile Software Development." (2018).

Battina, Dhaya Sindhu. "Best practices for ensuring security in Devops: A case study approach." International Journal of Innovations in Engineering Research and Technology 4.11 (2017): 38-45.

Mackey, Tim. "Building open source security into agile application builds." Network Security 2018.4 (2018): 5-8.

Downloads

Published

21-10-2021

How to Cite

[1]
P. Paidy, “Scaling Threat Modeling Effectively in Agile DevSecOps”, American J Data Sci Artif Intell Innov, vol. 1, pp. 556–577, Oct. 2021, Accessed: Mar. 07, 2026. [Online]. Available: https://ajdsai.org/index.php/publication/article/view/60