News: 1753986547

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

NIST discovers DevSecOps, thinks world should really check this out

(2025/07/31)


Watch out, world: The US government has finally found out about DevSecOps, and it has become a late evangelist for the security-by-default software development practice.

The National Institute of Standards and Technology (NIST) and a consortium including NIST's own National Cybersecurity Center of Excellence and a group of industry partners, teamed up to release a [1]draft framework on Wednesday to get organizations, public and private, to implement the practice.

The [2]document [PDF], a high-level overview of what NIST hopes to achieve, reads in portions like a [3]DevSecOps evangelical broadsheet, and in others, seems to simply be scolding folks for not doing a better job of adopting NIST's Secure Software Development Framework (SSDF). This is not a new problem, as the Office of Management and Budget already [4]pushed back its SSDF attestation deadline once under the Biden administration.

[5]

For those unfamiliar with DevSecOps, just think of it as your standard DevOps model, but instead of just integrating developers and operations teams, security is part of the mix from the very beginning. The end result, at least in theory, is a software product that incorporates necessary security features from the beginning, not as an afterthought.

[6]

[7]

Complementing a DevSecOps approach is NIST's SSDF, which outlines a number of best practices for secure software development. NIST even [8]notes on the SSDF's webpage that illustrating how to apply the SSDF to DevSecOps is a planned project for it. Based on Wednesday's announcement, it would seem that the project is up and running.

NIST stated that the consortium's goal is to "develop guidelines that demonstrate the implementation of best practices based on NIST's [SSDF]," and it's turning to the private sector to get ideas on how to connect those practices with DevSecOps. There are 14 vendors collaborating with NIST on the project, including Google, Microsoft, Dell, and GitLab.

[9]

"The SSDF looks at building software holistically, helping organizations figure out what needs to be done to make their development environment more secure," Alper Kerman, a cybersecurity engineer with the group and one of the publication's authors, said in the Institute's press release.

AI included, naturally

Kerman summed up the three-pronged goal of the consortium project quite succinctly in the press statement. A big portion of what NIST is doing with these draft guidelines, he noted, is figuring out how to simplify good software design practices with DevSecOps alongside things like off-the-shelf software and new AI capabilities, as well as zero-trust design principles.

The idea is to help companies construct software development environments where people can work securely. That includes controlling access just as much as ensuring that everything entering the environment is safely written to eliminate the risk of [10]software supply chain vulnerabilities .

NIST sees a big role for AI in this project, naturally, but not one devoid of oversight.

[11]Devs are frustrated with AI coding tools that deliver nearly-right solutions

[12]NIST turns to IT consultants to clear National Vulnerability Database backlog

[13]Feds want devs to stop coding 'unforgivable' buffer overflow vulnerabilities

[14]Pentagon declares war on 'outdated' software buying, opens fire on open source

"The use of AI technology in software development not only improves the work efficiency but also could bring higher quality software in [a] more timely manner," the draft DevSecOps framework reads. "Software development teams still need to ensure AI-generated content is monitored and validated by a human and that verifiable processes are in place to ensure its accuracy and trust."

Defining responsible use of AI tools in DevSecOps is a big part of the project, in other words. Zero-trust security will also play a big role, with NIST noting that the project would explore how to best incorporate zero-trust practices through the entire development process and environment, hopefully without making it a massive point of friction for already busy developers.

A workshop on the project is being held on August 27 to solicit feedback. NIST will use what it learns at the meeting to build a more complete outline, which it said it would continue to update based on feedback throughout the project, an end date for which wasn't specified.

[15]

We reached out to NIST to learn more about the project, but they were unable to share more information before publication. ®

Get our [16]Tech Resources



[1] https://www.nist.gov/news-events/news/2025/07/nist-consortium-and-draft-guidelines-aim-improve-security-software

[2] https://www.nccoe.nist.gov/sites/default/files/2025-07/nist-sp-1800-44a-ipd.pdf

[3] https://www.theregister.com/2018/02/02/building_security_into_software_via_devops/

[4] https://www.theregister.com/2023/06/13/attestation_form_deadline_moved/

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_software/devops&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aIvnedyrcYQB0dTHxTf1WgAAAJc&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_software/devops&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aIvnedyrcYQB0dTHxTf1WgAAAJc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_software/devops&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aIvnedyrcYQB0dTHxTf1WgAAAJc&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[8] https://csrc.nist.gov/projects/ssdf

[9] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_software/devops&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aIvnedyrcYQB0dTHxTf1WgAAAJc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[10] https://www.theregister.com/2025/03/20/software_supply_chain_defense/

[11] https://www.theregister.com/2025/07/29/coders_are_using_ai_tools/

[12] https://www.theregister.com/2024/06/03/nist_cve_backlog/

[13] https://www.theregister.com/2025/02/13/fbi_cisa_unforgivable_buffer_overflow/

[14] https://www.theregister.com/2025/05/06/us_dod_software_procurement/

[15] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_software/devops&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aIvnedyrcYQB0dTHxTf1WgAAAJc&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[16] https://whitepapers.theregister.com/



NIST? Really?

Anonymous Coward

Isn't this the folk trying (endlessly) to persuade the world to use useless encryption?

Now they think they can get people to use useless integrated/agile approaches so that software is EVEN MORE vulnerable....

Pass the sick bag, Alice!!

Anonymous Coward

Sometimes I wake up thinking I have a great new idea only to realize it's just Billy and the Cloneasaurus all over again.

In Riemann, Hilbert or in Banach space
Let superscripts and subscripts go their ways.
Our asymptotes no longer out of phase,
We shall encounter, counting, face to face.
-- Stanislaw Lem, "Cyberiad"