The OWASP DevSecOps Maturity Model (DSOMM)

Team di esperti Wiz

What is the DevSecOps maturity model?

DevSecOps maturity models provide structured frameworks for organizations to assess their current security integration practices and create roadmaps for systematic improvement throughout the software development lifecycle. In particular, the OWASP DevSecOps Maturity Model (DSOMM), the most widely adopted framework in this space, offers a standardized approach to evaluate how well security practices are embedded within development and operations processes.

This empowers organizations to reduce development time and costs while increasing agility and innovation. It also provides greater visibility into security risks, improves cross-team collaboration, and helps organizations achieve compliance goals through progressive security enhancement.

AWS Security Best Practices Cheat Sheet

Implementing the DevSecOps maturity model requires solid cloud security fundamentals. Get the AWS security cheat sheet to learn how you can improve your own cloud security.

The benefits of adopting the OWASP DSOMM

The OWASP DSOMM gives organizations a structured way to weave security into how they plan, build, and operate software. By using it as a roadmap, teams can unlock these benefits:

  • Faster, safer releases: Embedding security into every stage of development reduces the risk of late-stage surprises and costly rework.

  • Clear improvement path: This model gives teams a step-by-step guide for maturing their security practices, which makes it easier to prioritize investments and track progress.

  • Better collaboration: By breaking down silos between development, security, and operations, teams can work together to solve problems and share responsibility for risk.

  • Reduced risk and cost: Early detection and prevention of vulnerabilities lowers the chance of breaches and minimizes the cost of fixing issues, which is especially important in light of the fact that total ransomware incidents increased by 74% in 2023 from the previous year.  

  • Stronger compliance: The DSOMM helps organizations align with industry standards and regulatory requirements by making security processes more consistent and auditable.

5 maturity levels of the OWASP DSOMM

The OWASP DSOMM breaks security evolution into five distinct maturity levels, from siloed, reactive practices to advanced, organization-wide adoption. Here’s what each level looks like in practice and how it helps teams benchmark where they are today and identify the steps they need to move forward:

Initial stage: Siloed teams and reactive security

The initial stage represents organizations that use traditional, siloed development approaches where security remains separate from development and operations teams. These environments typically feature waterfall development models with manual processes and defer security considerations until the end of the development cycle, which creates significant risk exposure.

This reactive approach also leads to late vulnerability discovery and costly remediation efforts that slow down releases and strain team resources.

Level 1: Basic understanding of security practices

Level 1 organizations demonstrate basic security awareness but lack systematic implementation. At this stage, their security practices remain inconsistent and informal, and they often vary significantly between projects and development sprints. Additionally, while developers typically have some awareness of basic security threats, the organization hasn’t established systematic approaches for threat identification and mitigation during development.

Implementation

Level 1 implementation establishes foundational security controls across all SDLC phases. These practices create the baseline security posture that’s necessary for advancing to higher maturity levels.

To carry out level 1 implementation, you should conduct ad-hoc threat modeling for high-risk applications using simple checklists like STRIDE. Then, focus on whiteboarding general data flows and high-level system architecture and integrate basic threat modeling into the Definition of Done to consistently address security. These steps help you establish a security-first mindset and lay the groundwork for more advanced practices as the organization matures.

Next, establish basic business continuity and disaster recovery practices (like failovers and backups) to mitigate existential threats. You can do this by defining which systems and data are truly critical, setting clear recovery time and recovery point objectives, and documenting who does what during an outage. Even lightweight runbooks and periodic recovery drills at this stage can dramatically improve your ability to withstand and recover from a major incident.

Below is an implementation checklist that you can use for each SDLC phase:

  • Infrastructure:

    • Basic access control lists and multi-factor authentication

    • Edge encryption for external communication

  • Development:

    • Version control for artifacts, applications, and infrastructure code

    • Prevention of accidental updates or skipped CI/CD checks

    • Scanning for secrets in code and container images

    • Enforced commit signing

  • Testing and verification:

    • Opportunistic and discretionary testing

    • Testing of major functionality and for obvious vulnerabilities

  • Building and deployment:

    • Automated CI/CD process

    • Defined build process to reduce manual intervention

    • Security patch management policy for prioritizing, scheduling, and validating patches

    • Use of tools like Dependabot for managing third-party dependencies

  • Monitoring:

    • Centralized system logging

    • Simple budget metrics tracking

    • Basic system metrics monitoring

Wiz CI/CD scans

Level 2: Adoption of basic security practices

This stage focuses on embedding security expertise directly within development teams through designated security champions and formal training programs.

Security champions serve as dedicated liaisons between information security teams and development groups. These individuals receive specialized, ongoing training to become subject-matter experts on current security threats and best practices. Their responsibilities include researching and verifying security defects, prioritizing remediation efforts, and participating in risk assessments and architectural reviews. This embedded expertise improves application resilience while reducing attack surfaces.

Beyond these champions, however, all team members who are involved in software management, development, testing, or auditing should undergo regular security training. Doing this raises their awareness of security threats, best practices, and secure design principles like least privilege, defense-in-depth, and the OWASP Top 10 vulnerabilities.

Implementation

At this stage, organizations begin formalizing security practices and embedding security expertise within development teams. The following controls help them translate growing security awareness into repeatable, team-level processes:

  • Infrastructure:

    • Virtualized environments for applications

    • Automated backups and rollback procedures

    • Baseline hardening that adheres to security best practices

    • Separate test and production environments

    • Resource limitation to prevent denial-of-service issues

  • Development:

    • Unit testing for important security features

    • Basic negative testing to validate failure modes and error handling

  • Building and deployment:

    • Virtual environments for managing third-party systems and libraries

    • Pinned artifacts and a software bill of materials (SBOM)

    • Nightly builds for base images and use of distroless images

    • Secrets management through environment variables

    • Clear decommissioning process for unused resources

  • Testing and verification:

    • A shift left in CI/CD pipelines to enforce hardening best practices

    • Simple visualization and reporting tools for vulnerabilities

    • Dynamic component coverage, including client-side components

    • Role-based testing

    • Exposed services testing

  • Monitoring and measurement:

    • Improved visualizations for easier anomaly detection

    • Proactive alerts for security incidents

Level 3: High adoption of security practices

Organizations at level 3 achieve systematic security integration through standardized processes, automated controls, and comprehensive visibility across all development activities. They also begin aligning cybersecurity with strategic business initiatives—according to a 2024 Deloitte survey, 82% of respondents from “high–cyber-maturity” organizations said they are “very confident” in their C-suite and board’s ability to manage cybersecurity risk. 

In this stage, teams formalize practices that embed security thinking into product and feature development. Threat modeling also becomes standardized, including early assessment of business functions during product backlog creation. User stories and abuse stories then ensure that security considerations are top of mind during development. 

Beyond these aspects, security education becomes more engaging and team-oriented, with activities like build-it and fix-it contests, lessons-learned sessions, and bug bashes. Security peer reviews are also common here for both infrastructure and application code, and change management processes log system changes to preserve historical context and support continuous improvement.

Implementation

Level 3 focuses on standardization and automation to make security a consistent, measurable part of daily development workflows. The below practices enable teams to scale security efforts while maintaining visibility and control across the SDLC:

  • Infrastructure:

  • Development:

    • Integration of security checks into IDEs using linting plug-ins

    • Secure coding guidance in developer workflows (like inline feedback or templates)

  • Testing and verification:

  • Building and deployment:

    • Comprehensive SBOM, vulnerability assessment, and code and artifact signing

    • Encrypted and restricted access to secrets

    • Rolling deployments to minimize disruptions

  • Monitoring and measurement:

    • Reports on patch management and threat response

    • Improved time to recovery through organized observability data

Azure Security Best Practices Cheat Sheet

As you mature your DevSecOps practices across multi-cloud environments, having quick reference guides becomes essential.

Level 4: Very high adoption of security practices

Level 4 represents advanced security maturity with comprehensive threat modeling fully integrated throughout the software development lifecycle. At this stage, teams demonstrate a deep understanding of security standards and develop sophisticated abuse stories that anticipate complex attack scenarios. CI/CD pipelines also feature comprehensive automated guardrails for greater alignment with security and compliance requirements.

Here, the focus shifts to producing easily understood, operationalized reports and metrics that enable rapid decision-making and efficient remediation processes. That means security is the entire team’s responsibility, with a focus on getting early feedback and fast remediation. Teams also engage in war games and mutually test the security of systems that they’re not directly developing. Additionally, experts regularly come in to educate the team on the latest and best practices.

Implementation

At this level, teams deeply integrate and continuously optimize security across the organization. Check out the implementation chart below to learn how you can support advanced automation, faster feedback loops, and more informed decision-making at scale:

  • Infrastructure:

    • Production-like development and test environments

    • Consistent configuration and policy parity across dev, test, and production

  • Testing and verification:

    • Advanced testing techniques (like smoke testing and chaos testing)

    • Comprehensive coverage using various static analysis and security scanners

    • Informative, reproducible tickets for easy prioritization and fixing

  • Building and deployment:

    • Promotion of the same artifact through lower environments

    • High release frequency with short-lived artifacts and feature toggles

  • Monitoring and measurement:

    • Consolidated and contextualized metrics

    • Visualization of defense metrics

Level 5: Advanced deployment of security practices at scale

This level enables enterprise-scale security operations through formal processes that maintain high security standards across larger organizations with increased personnel and system complexity. It also focuses on scaling proven security practices through structured governance and collaborative security reviews. 

Additionally, regular architectural and code reviews at level 5 involve security experts, developers, and operations teams, who all work together to maintain security excellence at scale.

Implementation

Level 5 extends mature DevSecOps practices across complex, enterprise-scale environments. The controls below focus on governance, consistency, and resilience to ensure that security remains effective as systems, teams, and workloads grow:

  • Development:

    • Comprehensive, enforced secure coding guidelines

    • Regular validation of coding standards through automated checks and peer reviews

  • Testing and verification:

    • Tests with telemetry for performance and security insights

    • Very high test coverage, with almost all defects fixed

  • Building and deployment:

    • Deployment of only tested, hardened, and signed artifacts

    • Advanced deployment techniques (like canary or blue-green)

  • Monitoring and measurement:

    • Aggregated and centralized data from multiple sources

    • Proactive threat response using automated log and metric auditing

How Wiz accelerates DevSecOps maturity

Wiz accelerates DevSecOps maturity progression by providing the necessary integrated security platform capabilities at each maturity level. Our platform also enables organizations to implement DSOMM practices more effectively through automated security controls and comprehensive visibility.

Here are some key alignment areas that Wiz helps with:

  • Shift left security: Wiz integrates with your CI/CD pipeline, IDE, and version control system to detect and remediate vulnerabilities, misconfigurations, and secrets early in the development process. This proactive approach helps teams prevent security issues from reaching production.

  • Continuous monitoring: Our platform continuously scans your cloud environment for vulnerabilities, misconfigurations, and other security risks so you can detect and address any deviations from security baselines promptly.

  • Automation and integration: It also offers built-in integrations with ticketing, workflow, and messaging applications to automatically route security issues to the appropriate teams. This facilitates efficient remediation and policy enforcement.

  • Unified security policies: Wiz enforces a homogeneous set of security policies across your development pipeline and cloud environment for consistency and to reduce the risk of security drift.

  • Comprehensive risk analysis: Our security graph models your cloud architecture and identifies the most critical risk combinations to prioritize remediation efforts based on their potential impact.

Ready to learn how Wiz can accelerate your DevSecOps journey? Request a demo today to explore how Wiz can secure your cloud environment.

Secure your SDLC from start to finish

See why Wiz is one of the few cloud security platforms that security and devops teams both love to use.

Per informazioni su come Wiz gestisce i tuoi dati personali, consulta il nostro Informativa sulla privacy.


FAQs