This study plan is based on milestones. So, check how much you can cover within the timeline. The more you cover the topics, the better candidate you are for the job roles which require good knowledge of DevSecOps. Also, I assume you have already checked and are comfortable with Common Security Skills study plan.
Just to make sure that everyone understands what you need to learn to be a DevSecOps Engineer / DevSecOps-focused security engineer. DevSecOps is not just "adding security tools to CI/CD". It is about building security into how software is planned, built, tested, delivered, and operated – with as much automation and feedback as possible.
It is more towards:
- working closely with developers, SRE/DevOps, and AppSec,
- integrating security checks into pipelines and platforms,
- defining secure defaults and guardrails,
- enabling teams to ship fast and safely.
Usually it will take you 6-12 months to be good at the DevSecOps fundamentals to get a job at entry level or move laterally from AppSec/DevOps into a DevSecOps role.
- DevSecOps is not a separate silo – it is how development, security, and operations work together.
- Think more of a combination of developer, DevOps/SRE, and security engineer.
- You should be comfortable with CI/CD systems, containers, and basic cloud concepts.
- You should know enough Application Security to choose and tune the right checks.
- Automation, feedback loops, and culture change are as important as tools.
- DevSecOps Fundamentals - 3-4 weeks
- CI/CD and Automation Basics - 3-4 weeks
- Security Testing in the Pipeline - 4-6 weeks
- Cloud, Containers and IaC Security - 4-6 weeks
- Platform Guardrails and Governance - 3-4 weeks
- Metrics, Feedback and Culture - 2-3 weeks
- Books
- Videos
- Courses
- Certifications
- Interview Questions
Duration: 3-4 weeks
Goal here is to understand what DevSecOps is and what problems it tries to solve.
- Understand the evolution:
- Dev → DevOps → DevSecOps.
- Why traditional "security at the end" does not work.
- Read or refresh related study plans:
- Application Security Study Plan
- Security Development Lifecycle (SDL) Study Plan
- Relevant cloud security study plan(s) (AWS/Azure/GCP) if you know your focus.
- Understand the main DevSecOps goals:
- Shift security left (earlier in SDLC) and right (monitoring in production).
- Make security part of the delivery pipeline, not a blocking afterthought.
- Provide self-service security capabilities for product teams.
- Know typical DevSecOps responsibilities:
- Designing and maintaining security checks in CI/CD.
- Working with platform/DevOps teams to define secure defaults.
- Helping AppSec/Product Security scale via automation.
Duration: 3-4 weeks
You cannot do DevSecOps effectively without basic CI/CD understanding.
- Learn one or two CI/CD platforms in depth (e.g., GitHub Actions, GitLab CI, Jenkins, Azure DevOps, CircleCI – depending on your environment).
- Understand common pipeline stages:
- Build
- Unit/Integration tests
- Security tests
- Packaging and artifact management
- Deployment
- Learn infrastructure around pipelines:
- Repositories and branching strategies.
- Environments (dev, test, stage, prod).
- Secrets management for pipelines.
- Practice:
- Create a simple app and add a basic CI pipeline (build + tests).
- Then plan where security checks will be plugged in (SAST, SCA, etc.).
Duration: 4-6 weeks
Here you focus on what kinds of security checks you can automate and where.
- Static Application Security Testing (SAST)
- What it is good at and its limitations (false positives, language support).
- Where to run it in the pipeline (typically on pull request/merge).
- How to configure basic rules and quality gates.
- Software Composition Analysis (SCA) / Dependency Scanning
- Why vulnerable dependencies are a big risk.
- License risks and SBOM basics.
- Automating dependency checks and upgrade workflows.
- Secrets Detection
- Preventing API keys and passwords from being committed.
- Pre-commit hooks vs pipeline checks.
- Dynamic Application Security Testing (DAST) and API testing
- Basic idea of black-box testing against running apps/APIs.
- Where in the delivery process to run it (e.g., pre-prod env).
- Container and Image Scanning
- Base image vulnerabilities.
- Application packages inside containers.
- Integrating scanning into image build process.
You do not need to be an expert in every tool, but you should understand which type of test fits which risk and where in the pipeline it makes sense.
Duration: 4-6 weeks
Most DevSecOps work today happens around cloud-native stacks.
- Containers and orchestration:
- Basics of Docker (images, containers, Dockerfile).
- Basics of Kubernetes or your orchestration platform (pods, services, deployments, namespaces).
- Common container security risks (running as root, capabilities, image provenance).
- Infrastructure as Code (IaC):
- Terraform, CloudFormation, ARM/Bicep, etc.
- Why IaC is powerful for repeatable, auditable infrastructure.
- Typical misconfigurations (open security groups, public buckets, missing encryption).
- Cloud security baselines:
- Align with your cloud study plan(s) for core cloud security concepts.
- Understand provider-native security services (e.g., security center, config, guardrails).
- DevSecOps role here:
- Integrate image and IaC scanning into pipelines.
- Enforce baseline policies via policy-as-code (e.g., OPA/Conftest, admission controllers).
Duration: 3-4 weeks
DevSecOps is also about secure platforms, not only individual pipelines.
- Understand platform engineering concepts:
- Internal developer platforms.
- Golden paths and templates.
- Typical security guardrails:
- Standardized service templates with logging, monitoring, and security defaults.
- Centralized identity and access patterns.
- Network policies and ingress/egress controls.
- Governance and approvals:
- When approval workflows are necessary.
- Automating checks so humans mainly handle exceptions.
- Work with Product Security / AppSec / Cloud Security to define:
- Minimal controls all services must have.
- Exception handling and risk acceptance process.
Duration: 2-3 weeks
DevSecOps is as much about people and feedback as it is about tools.
- Metrics you might track:
- Security findings per pipeline or service (and trends).
- MTTR for security issues.
- Adoption of security checks (percentage of services with SAST/SCA/etc.).
- Feedback loops:
- Making scanner results visible and understandable to developers.
- Fast feedback on pull requests.
- Security office hours or help channels.
- Culture and enablement:
- Security champions in teams.
- Training developers on interpreting and fixing findings.
- Keeping friction low – avoid turning tools into constant blockers.
- Any solid DevOps/Continuous Delivery book to understand the base culture and practices.
- Books on building Application Security programs (see Application Security plan) – useful for understanding what you are automating.
- Books on cloud-native security and container security that include CI/CD viewpoints.
- Conference talks on DevSecOps (OWASP, DevOpsDays, KubeCon, etc.).
- Videos showing real-world CI/CD security implementations.
- Talks on security automation, policy-as-code, and platform engineering.
- DevSecOps-focused courses that cover CI/CD, automation, and security tooling.
- Cloud-native security courses that include pipeline and platform topics.
- Container and Kubernetes security courses that show how to integrate checks into pipelines.
- Cloud security certifications related to your main cloud provider (AWS/Azure/GCP).
- DevOps/Cloud-native certifications that cover CI/CD and containers.
- Application Security or Secure SDLC certifications if you want to emphasize the security side.
You can reuse many questions from the Application Security interview questions and from any cloud/security interviews, but focus on how you would automate and integrate security into pipelines and platforms.
Additional DevSecOps-focused questions could be:
- How would you add security checks into an existing CI/CD pipeline without slowing teams down too much?
- How do you decide which security tools to run on pull requests vs in nightly builds?
- How would you integrate container and IaC scanning into the delivery process?
- How would you measure the success of a DevSecOps initiative over 6–12 months?