Ultimate Guide to CI/CD Vulnerability Training | Hokstad Consulting

Ultimate Guide to CI/CD Vulnerability Training

Ultimate Guide to CI/CD Vulnerability Training

In today's fast-paced software development world, CI/CD pipelines are essential but come with security risks. Training your team to manage vulnerabilities is critical to maintaining secure and efficient workflows. Here’s what you need to know:

  • What CI/CD pipelines are: Automated workflows triggered by code commits to build, test, and deploy software quickly.
  • Key risks: Compromised pipelines, weak secrets management, and vulnerabilities in third-party dependencies.
  • Why training matters: Spotting vulnerabilities early saves costs, ensures compliance (e.g., UK GDPR), and fosters shared security responsibility.
  • Training focus areas:
    • Secure coding: Input validation, error handling, and protecting sensitive data.
    • Threat modelling: Identifying risks like weak access controls or dependency chain attacks.
    • Vulnerability scanning: Using tools like SAST, DAST, and incident response strategies.

To build effective training:

  • Tailor programmes to roles (developers, operations, security teams, managers).
  • Include hands-on exercises (e.g., workshops, simulated breaches).
  • Use tools like SonarQube, OWASP ZAP, and HashiCorp Vault for practical learning.
  • Measure success with metrics like vulnerability reduction rates and remediation times.

For UK organisations, align training with local regulations (e.g., UK GDPR, Cyber Essentials) and consider industry-specific needs. External consulting, such as Hokstad Consulting, can help design bespoke programmes.

Start small, focus on high-risk areas, and expand as you see results. A well-trained team ensures your CI/CD pipelines remain fast, secure, and reliable.

TryHackMe: CI/CD and Build Security: A Comprehensive Guide ⛔

TryHackMe

Key Areas of CI/CD Vulnerability Training

A strong vulnerability training programme focuses on three key areas: secure coding, threat modelling, and proactive scanning. These elements are essential for protecting CI/CD pipelines from potential threats and ensuring a solid security foundation.

Secure Coding Practices

At the core of secure coding lies input validation. Ensuring all incoming data is validated and sanitised prevents injection attacks and data corruption. This involves checking data types, lengths, formats, and ranges before processing to ensure they meet expected criteria.

Another critical area is error handling. Poorly designed error messages can inadvertently expose sensitive system details, such as database structures or internal processes. Developers should be trained to create generic error messages for users while securely logging detailed debugging information for internal use.

Protecting sensitive data is also paramount, particularly when dealing with personal information under UK GDPR regulations. Understanding how data flows through the CI/CD pipeline is essential to ensure compliance and safeguard against breaches.

Adopting a shift-left security approach - integrating security measures early in the development process - helps organisations address vulnerabilities before they become costly to fix. By embedding secure coding practices from the start, teams can save time and resources while reducing risk [3].

Once secure coding is in place, the focus can expand to identifying and addressing potential threats through structured modelling.

Threat Modelling and Attack Vectors

Threat modelling turns abstract security concerns into clear, actionable steps. This process involves identifying critical assets, exposing potential threats, and prioritising countermeasures. Instead of guessing where vulnerabilities might lie, teams can systematically evaluate their CI/CD pipelines and focus on addressing actual risks.

By analysing the pipeline's architecture, design, and functionality, teams can uncover vulnerabilities in data flow, access controls, and integration points [1][2]. This structured approach encourages teams to think like attackers, exposing weaknesses that might otherwise go unnoticed.

Familiarity with the OWASP Top 10 CI/CD security risks provides a practical framework for spotting vulnerabilities. Examples include Insufficient Flow Control Mechanisms, where pipelines lack proper approval processes for critical changes, and Inadequate Identity and Access Management, which allows unauthorised access through weak authentication [2]. Another growing concern is Dependency Chain Abuse, where attackers compromise third-party packages to inject malicious code into applications [2].

A particularly dangerous risk is Poisoned Pipeline Execution, where attackers manipulate pipeline configurations to execute harmful code. Teams must be trained to enforce strict permission controls to prevent such incidents [2].

The benefits of threat modelling are clear. Organisations embedding security into their DevOps practices are 2.4 times more likely to detect security incidents before they cause significant damage [3]. This proactive mindset, cultivated through structured threat analysis, is a game-changer for preventing breaches.

With threats mapped out, the next step is to tackle them head-on using automated tools and a clear response strategy.

Vulnerability Scanning and Incident Response

Automated scanning tools play a pivotal role in modern vulnerability detection, but their effectiveness hinges on proper use. Training should cover tools like static application security testing (SAST), dynamic application security testing (DAST), and software composition analysis (SCA). Each tool targets different types of vulnerabilities, making them complementary rather than interchangeable.

Developers must also learn to differentiate false positives from genuine threats and integrate fixes efficiently. This ensures that security scanning doesn’t become a bottleneck in the development process.

Equally important is incident response planning. Teams need a clear roadmap for what to do when vulnerabilities are detected in production. This includes immediate containment measures, communication protocols, and timelines for remediation. Training should address both technical responses - like rolling back deployments or applying emergency patches - and business-level actions, such as notifying customers or meeting regulatory reporting requirements.

The rise of DevSecOps highlights the importance of these skills. By 2022, 90% of software development projects reported adopting DevSecOps practices, a sharp increase from 40% in 2019 [3]. A SANS Institute survey also found that 64% of respondents saw improved security posture after implementing DevSecOps practices [3].

When properly configured, automated tools complement continuous monitoring to maintain a strong security stance. This vigilance ensures that new vulnerabilities are addressed promptly and that security measures evolve alongside the applications they protect.

Together, these training areas lay the groundwork for a security-first mindset. When teams understand the tools, processes, and reasoning behind their security practices, they naturally integrate these measures into their daily workflows, strengthening the organisation's overall resilience.

How to Set Up Training Programmes

Designing impactful vulnerability training programmes requires thoughtful planning tailored to your organisation's needs. The best programmes blend targeted learning with practical application, ensuring teams can immediately implement what they’ve learned in their day-to-day responsibilities. By doing so, you empower your teams to handle vulnerabilities effectively at every stage. Let’s dive into how to customise training for different roles.

Role-Based Training

Each role in your organisation has unique security training needs.

  • Developers need to focus on secure coding practices, spotting vulnerabilities, and remediation techniques. Their training should include practical skills like conducting code reviews, developing secure APIs, and understanding how their coding decisions affect the entire CI/CD pipeline.

  • Operations teams should concentrate on infrastructure security, monitoring, and incident response. Training topics might include configuring security tools, interpreting alerts, and responding to vulnerabilities. Specific areas like pipeline security, access controls, and operational vulnerability management are particularly important.

  • Security teams require a broader perspective. Their training should cover threat intelligence, risk assessments, and strategies for communicating security requirements to development and operations teams in a way that minimises friction.

  • Management and team leads benefit from training on security metrics, compliance requirements, and balancing security needs with delivery deadlines. They should understand the business impact of security decisions and learn how to encourage security-conscious thinking across their teams.

This targeted approach ensures each team member gains relevant skills without feeling overwhelmed.

Hands-On Exercises

Theoretical knowledge alone doesn’t cut it when it comes to vulnerability management. Practical exercises turn abstract concepts into actionable skills. Workshops, simulated breaches, and red team exercises are great ways to prepare teams for real-world challenges.

  • Workshops with real code examples help developers identify vulnerabilities and implement secure alternatives. This hands-on approach makes lessons more tangible and applicable.

  • Red team exercises, where security experts attempt to exploit vulnerabilities in your CI/CD pipelines, provide invaluable insights. These controlled scenarios expose weaknesses while highlighting the importance of layered security measures.

  • Tabletop exercises are discussion-based scenarios that test incident response processes. Teams work through potential incidents, identify gaps in their procedures, and refine their coordination for actual events.

The key to effective hands-on training is to create scenarios that closely reflect your organisation’s specific technology stack and workflows. Generic exercises often miss the mark because they don’t address the unique challenges teams face daily.

Building a Security-First Culture

Technical training alone isn’t enough; fostering a mindset where security is everyone’s responsibility is just as important.

  • Security champions within development and operations teams can act as advocates for best practices. By receiving additional training, these individuals serve as a bridge between their teams and the security department, translating security requirements into actionable guidance.

  • Collaboration across teams - development, operations, and security - helps break down silos. Joint training sessions, shared goals, and collaborative problem-solving build trust and mutual understanding, making implementation smoother.

  • Continuous learning programmes keep everyone up to date as threats and technologies evolve. Regular updates on new vulnerabilities, emerging attack methods, and updated best practices can be delivered through monthly briefings, quarterly deep dives, or annual reviews.

  • Recognition and incentives for proactive security behaviour can reinforce its importance. Highlighting teams that identify and fix vulnerabilities, celebrating successful incident responses, or including security metrics in performance evaluations can motivate teams to stay engaged.

Creating a psychologically safe environment is also crucial. Team members should feel comfortable raising concerns, reporting issues, or asking questions without fear of blame. This openness helps catch vulnerabilities early, preventing them from escalating into major problems.

When vulnerability management becomes a shared responsibility, with each team member contributing their expertise, organisations build stronger systems and more engaged teams.

Tools and Methods for Vulnerability Management

Building on the earlier discussion around secure coding, threat modelling, and incident response, this section dives into the essential tools that support effective vulnerability management. Training teams to use these tools properly is key to building robust security practices. When integrated thoughtfully, these tools can enhance every stage of the CI/CD process. The challenge lies in picking tools that align with your organisation's technology stack, while ensuring teams understand not just how to operate them, but also when and why each tool is needed. Let’s explore some critical security testing tools.

Security Testing Tools

Static Application Security Testing (SAST) tools analyse source code for vulnerabilities before deployment. These tools are excellent for spotting common issues like SQL injection flaws, cross-site scripting, and insecure data handling. Developers should be trained to interpret SAST results, filter out false positives, and implement fixes efficiently.

One popular SAST tool is SonarQube, which supports multi-language code quality and security analysis. Teams should learn to configure quality gates to block code with critical vulnerabilities from progressing through the pipeline. SonarQube’s ability to integrate with CI/CD platforms like Jenkins, GitLab, and Azure DevOps makes it a seamless addition to workflows.

Dynamic Application Security Testing (DAST) tools, on the other hand, focus on testing applications in their running state to uncover vulnerabilities that only appear during execution. These tools simulate real-world attacks on applications and APIs. OWASP ZAP is a great choice for both automated scanning and manual testing.

Interactive Application Security Testing (IAST) combines elements of static and dynamic testing. It monitors applications from the inside during testing phases, providing real-time insights into vulnerabilities with precise line-of-code accuracy. Tools like Contrast Security are particularly effective, as they reduce false positives and offer actionable insights.

While testing tools are crucial, securely handling credentials is equally important.

Secrets Management

Hardcoded credentials, API keys, and configuration secrets can create serious vulnerabilities in CI/CD pipelines. Training teams to identify and manage secrets properly helps prevent data breaches and unauthorised access.

HashiCorp Vault is a powerful tool for managing secrets, offering features like dynamic secrets generation, encryption as a service, and detailed audit logs. Training should cover Vault’s integration patterns, such as configuring applications to retrieve secrets at runtime instead of storing them in configuration files. Teams should also gain hands-on experience with Vault’s authentication methods, policy setup, and secret rotation.

For organisations using Amazon Web Services, AWS Secrets Manager provides a cloud-native solution for secrets management. Training should focus on integrating Secrets Manager into CI/CD pipelines, setting up automatic credential rotation, and using IAM policies to control access. Its compatibility with other AWS services makes it a practical choice for cloud-first teams.

Similarly, Azure Key Vault is tailored for Microsoft ecosystems, offering hardware security module (HSM) backed key storage and detailed audit trails. Training should demonstrate how to use managed identities to eliminate the need for service principal credentials in CI/CD pipelines.

Additionally, teams should be trained in secrets scanning practices. Tools like GitLeaks and TruffleHog can detect accidentally committed secrets in version control systems. Practical training should include setting up pre-commit hooks and configuring CI/CD stages to scan for exposed credentials.

Once code and credentials are secured, continuous monitoring and automation round out the vulnerability management process.

Monitoring and Automation

Security Information and Event Management (SIEM) platforms like Splunk Enterprise Security and IBM QRadar centralise security data for monitoring. Training should focus on configuring meaningful alerts, interpreting dashboards, and responding to notifications effectively.

Security Orchestration, Automation, and Response (SOAR) platforms take automation a step further by streamlining incident response workflows. Tools like Phantom (part of Splunk) and Demisto (acquired by Palo Alto Networks) automate routine security tasks and coordinate responses. Teams should learn to create playbooks for common incidents and establish clear escalation protocols.

For containerised environments, runtime monitoring tools like Falco are essential. Falco detects anomalous behaviour and policy violations in Kubernetes environments. Training should include creating Falco rules, integrating with alert systems, and correlating alerts with CI/CD events.

Prometheus and Grafana are another powerful duo for monitoring CI/CD pipeline security metrics. Teams should be trained to build dashboards that track security scan results, monitor deployment success rates, and identify trends in vulnerability remediation. These insights can help measure the effectiveness of security initiatives and highlight areas for improvement.

Finally, Infrastructure as Code (IaC) security scanning tools like Checkov and Terrascan analyse Terraform, CloudFormation, and Kubernetes manifests for misconfigurations. Training should emphasise incorporating these tools into CI/CD pipelines to ensure infrastructure changes are reviewed for security risks alongside application code.

Effective vulnerability management combines diverse tools with well-defined processes and automation. Teams equipped with the right skills can quickly identify, evaluate, and address vulnerabilities while maintaining development speed and system reliability.

Need help optimizing your cloud costs?

Get expert advice on how to reduce your cloud expenses without sacrificing performance.

Measuring and Improving Training Effectiveness

Keeping vulnerability training effective requires constant evaluation and updates to stay ahead of emerging threats. With the cybersecurity landscape shifting rapidly, tracking the outcomes of training and adjusting programmes as needed is essential.

Measuring success involves more than just counting attendance or completion rates. It’s about identifying meaningful metrics that show real progress, gathering actionable feedback, and maintaining detailed records to guide improvements. Let’s delve into the key metrics, review strategies, and testing methods that can refine your training efforts.

Key Security Metrics

To assess whether your training is making a difference, focus on metrics that tie directly to improved security outcomes.

  • Vulnerability reduction rates: Track the number of critical and high-severity vulnerabilities found in code before and after training. A good programme should lead to a noticeable drop in vulnerability density over time. Monitor these trends monthly or quarterly to spot patterns.

  • Mean time to remediation (MTTR): This measures how quickly teams fix identified vulnerabilities. Training should empower developers to resolve issues faster. Start by benchmarking current remediation times and track how they improve post-training.

  • Security scan pass rates: Monitor the percentage of builds passing security scans without requiring fixes. A rising pass rate suggests developers are proactively applying secure coding practices.

  • Incident frequency and severity: While external factors can influence these numbers, fewer security incidents over time can indicate effective training. Record incident types to ensure your programme addresses the most relevant threats.

  • Knowledge retention scores: Use periodic assessments to measure how well participants retain what they’ve learned. Conduct tests before training, immediately after, and at intervals like three and six months to track knowledge retention.

  • Engagement metrics: High engagement often leads to better learning outcomes. Keep an eye on completion rates, time spent on modules, and participation in interactive exercises to identify potential issues with content or delivery.

Regular Reviews and Feedback

Improving training requires ongoing feedback and regular reviews. These ensure that programmes stay relevant as threats and organisational needs change.

  • Quarterly retrospectives: Gather input from teams and managers to evaluate how well training aligns with their needs. Focus on the relevance of content, delivery methods, and practical application. Team leaders and managers can also provide insights into changes in behaviour, such as improved code reviews or more frequent security discussions.

  • Anonymous surveys and peer reviews: These encourage honest feedback and help identify gaps. Distribute surveys immediately after training and again later to see how participants apply what they’ve learned. Include questions about content clarity, relevance, and areas for improvement.

  • Training content audits: Review training materials every six months to ensure they reflect current threats and best practices. Update case studies, examples, and tool demonstrations to keep them aligned with the latest security challenges and technologies.

  • Stakeholder alignment sessions: Collaborate with security teams, DevOps engineers, and business leaders to ensure training objectives match organisational security goals. These sessions can also identify new risks to address in future training.

Testing and Documentation

Testing and thorough documentation provide a clear picture of training effectiveness and support compliance efforts.

  • Controlled security exercises: Simulate attacks to test whether developers can apply what they’ve learned. Use these exercises to uncover knowledge gaps and areas needing more attention.

  • Tabletop exercises: These scenario-based discussions test teams’ ability to follow incident response procedures without technical execution. Rotate scenarios quarterly to cover a variety of threat types.

  • Skills-based assessments: Hands-on challenges, like identifying vulnerabilities in sample code or configuring security tools, offer a better evaluation of practical knowledge than traditional tests.

  • Training records management: Keep detailed records of attendance, assessment scores, feedback, and any remedial actions. This documentation not only supports compliance but also helps refine future training.

  • Compliance mapping: Ensure your training aligns with relevant standards like ISO 27001 or the NIST Cybersecurity Framework. Regularly audit content to confirm it meets industry and regulatory requirements.

  • Incident correlation analysis: When incidents occur, analyse whether they relate to training topics. This helps prioritise future content and spot any gaps in coverage.

  • Continuous monitoring dashboards: Use dashboards to track key metrics in real time, such as vulnerability trends and assessment scores. Regular reviews of these dashboards allow for early issue detection and data-driven improvements.

UK-Specific Training Considerations

When it comes to vulnerability training in the UK, organisations must navigate a unique blend of compliance and practical challenges. From adhering to strict data protection laws to meeting industry-specific regulations, British businesses face a complex landscape. Effective training programmes must strike a balance between meeting these legal requirements and delivering actionable, practical strategies that fit within the UK’s specific business context.

By understanding these local requirements, organisations can ensure their training initiatives not only strengthen security but also align with legal obligations and workplace expectations common in the UK.

UK Compliance and Regulations

Vulnerability training in the UK must align with several critical regulatory frameworks that directly influence CI/CD security practices. These regulations ensure that security efforts support operational goals while meeting legal standards across development pipelines.

  • The UK GDPR: As the cornerstone of data protection, UK GDPR requires training programmes to address secure data handling throughout the development cycle. Developers must understand practices like data masking and managing test data to safeguard sensitive information.

  • Financial Services (FCA Regulations): For organisations in the financial sector, training must cover areas like financial data protection, secure transaction handling, and prompt incident response. The FCA’s operational resilience framework, effective since March 2022, also requires businesses to identify and safeguard critical services.

  • Healthcare (NHS Digital Standards): Healthcare organisations must prioritise patient data confidentiality, secure API development, and compliance with clinical safety standards. NHS Digital’s Data Security and Protection Toolkit mandates annual assessments, including evidence of staff training.

  • Cyber Essentials Scheme: This scheme provides a practical framework for improving security. Training should cover five key controls: boundary firewalls, secure configuration, access control, malware protection, and patch management. These align naturally with CI/CD security practices.

  • Critical National Infrastructure (NIS Regulations 2018): Operators of critical infrastructure must meet specific obligations, including securing data confidentiality, detecting threats, reporting incidents within 72 hours, and coordinating with the National Cyber Security Centre (NCSC).

UK organisations also face unique documentation requirements, needing to demonstrate reasonable steps to prevent security incidents. This means training records must include not just attendance but also competency assessments and evidence of ongoing professional development.

Custom Training and Consulting Support

Generic training programmes often fail to meet the specific needs of UK businesses. Tailored consulting services can bridge this gap by developing vulnerability training that aligns with both technical and compliance requirements.

Hokstad Consulting, for example, specialises in optimising DevOps and cloud infrastructure for UK organisations. Their expertise spans technical security and local regulatory landscapes, making them well-suited to crafting bespoke training solutions.

Custom training begins with an in-depth assessment of current CI/CD processes, identifying vulnerabilities and compliance gaps. This includes addressing challenges like data residency requirements, post-Brexit cross-border data transfer rules, and sector-specific regulations.

Tailored training content can address industry-specific scenarios often overlooked by generic programmes. For instance:

  • A UK retailer may need guidance on PCI DSS compliance within CI/CD pipelines.
  • A government contractor might require training aligned with the Government Security Classifications policy.

Hands-on workshops can incorporate real-world scenarios based on UK-specific threat intelligence, such as simulations of attacks targeting British infrastructure or case studies from public sector incidents. This contextual approach makes training far more relevant and impactful.

Additionally, consulting services often consider organisational culture. In the UK, traditional hierarchical structures, communication preferences, and the balance between personal accountability and team collaboration play a significant role in shaping effective training strategies.

Ongoing Support and Adaptation
Vulnerability training isn’t a one-off activity; it requires regular updates to reflect new regulations, emerging threats, and evolving organisational needs. This might include:

  • Reviewing training effectiveness against UK-specific metrics.
  • Updating content based on guidance from regulators like the ICO or NCSC.
  • Adapting to shifts in the threat landscape.

For smaller UK businesses, cost is often a key concern. Consulting can help identify cost-effective strategies, such as phased training rollouts, leveraging internal expertise, or focusing on high-risk areas of the CI/CD pipeline.

Finally, integrating AI and automation into training reflects the growing sophistication of DevOps practices in the UK. Custom programmes can teach teams how to effectively use AI-powered security tools within CI/CD workflows, ensuring they understand both the strengths and limitations of automated systems. This integration supports the development of advanced, forward-thinking vulnerability management strategies.

Key Takeaways for CI/CD Vulnerability Training

As we wrap up this exploration of CI/CD vulnerability training, let’s focus on the key practices and actionable steps that can transform your pipelines into secure, reliable environments. When done right, vulnerability training doesn’t just reduce risks - it ensures compliance, boosts developer confidence, and strengthens your overall security posture.

Summary of Best Practices

Here’s a quick recap of the core strategies:

  • Role-based training: Tailor training to the specific needs of developers, DevOps teams, and security professionals. Each group faces unique challenges, and addressing these ensures more effective learning.

  • Hands-on exercises: Practical training beats theory every time. Use real-world scenarios that reflect the tools and environments your teams work with daily.

  • Commit to continuous improvement: Regularly assess your training programmes, gather feedback, and update content to address new vulnerabilities as they emerge.

  • Embed a security-first mindset: Make vulnerability training part of everyday workflows. When it’s integrated into daily operations, teams naturally develop stronger security habits.

  • Track measurable results: Use metrics like vulnerability detection rates, remediation times, and incident frequency to evaluate the effectiveness of your training efforts.

By following these practices, you’ll lay the groundwork for a training programme that’s both impactful and sustainable.

Next Steps

To get started, assess your current CI/CD security setup and identify where training is most needed. This will help you pinpoint gaps between your current capabilities and your desired security outcomes.

  • Focus on high-risk areas first: Prioritise training efforts on the most critical vulnerabilities in your environment to maximise the impact of your initial programmes.

  • Develop internal expertise: Invest in training internal champions who can lead ongoing efforts. This approach helps reduce costs while building a long-term, sustainable security culture.

  • Consider external support if needed: If your organisation requires specialised expertise, consulting services can help you design and implement effective training programmes. For example, Hokstad Consulting offers tailored solutions for DevOps transformation and cloud infrastructure, ensuring both technical security needs and UK-specific compliance requirements are addressed.

  • Start small and scale up: Begin with pilot programmes targeting specific teams or areas. Learn from these early efforts and expand gradually, applying lessons as you scale.

FAQs

What are the essential elements of a successful CI/CD vulnerability training programme?

A well-executed CI/CD vulnerability training programme should focus on weaving security into every step of the pipeline. This means automating security scans, adopting a shift-left strategy to tackle vulnerabilities early in the development process, and equipping developers with knowledge on secure coding and vulnerability management.

Other crucial elements include conducting regular security reviews, implementing strong secret management practices, and promoting a mindset of proactive security awareness. By making these practices a core part of the development workflow, organisations can minimise risks and strengthen the security of their CI/CD pipelines.

How can organisations in the UK ensure their CI/CD vulnerability training complies with regulations like UK GDPR and Cyber Essentials?

To ensure CI/CD vulnerability training aligns with UK-specific regulations like UK GDPR and Cyber Essentials, organisations should embed core principles such as data protection by design and default into their training initiatives. This means emphasising secure coding practices, responsible data management, and reducing risks across the CI/CD pipeline.

Incorporating security measures from Cyber Essentials - like secure system configurations, strict access controls, and timely application of patches - further supports compliance while addressing vulnerabilities. Keeping training materials up to date with evolving regulations and industry best practices is essential for maintaining both compliance and robust security.

How can teams effectively embed a security-first approach into their CI/CD workflows?

To bring a security-first mindset into CI/CD workflows, it's essential to weave automated security checks into every stage of the pipeline. This means using tools for tasks like static code analysis, dependency scanning, and secret management to catch vulnerabilities as early as possible.

Adding security gates that halt deployments when critical issues arise is another way to maintain ongoing protection. Alongside this, regular developer training on security best practices and embedding security tests as a routine part of the pipeline help solidify this approach. By treating security as a core element of daily processes, teams can strengthen their systems and minimise potential risks.