Building a Real DevSecOps Pipeline on AWS

Most teams I work with have a pipeline. The problem is what happens inside it. Security tooling gets added reactively — a SonarQube instance nobody reviews, a Trivy scan that's set to warn instead of block, image tags so loosely managed that nobody can tell you what's actually running in production. The tools exist. The gates don't. This week I built a reference DevSecOps pipeline on AWS to demonstrate what it looks like when the gates are real. A few deliberate choices worth noting: → SAST with Bandit, not SonarQube. This is a Python service. Bandit is purpose-built for Python, runs in seconds with zero infrastructure overhead, and produces actionable output. Defaulting to SonarQube for every stack regardless of context is a tool decision masquerading as an architecture decision. → Container images tagged with git commit SHA, not "latest". Every running container is traceable to its exact source commit. When something breaks in production, you know precisely what code is running. This is not optional in any environment that takes incident response seriously. → Trivy configured to block, not warn. A scan that warns and proceeds is a reporting tool. A scan that blocks on HIGH severity CVEs with available fixes is a security gate. The distinction matters significantly under pressure. → ECS tasks in private subnets. The ALB faces the internet. The containers do not. This is the baseline architecture, not advanced hardening. The entire infrastructure — VPC, ECS Fargate, ALB, ECR, CodePipeline, CloudWatch — is Terraform. Nothing was configured through a console. Reproducible, auditable, version-controlled. Full code: https://lnkd.in/gr3G7K-k I work with engineering teams in telecom, e-commerce and fintech to close the gap between having security tooling and having security gates that actually hold. If that's a conversation worth having, my inbox is open. #devsecops #cloudnative #aws #terraform #cicd #devops #appsec #platformengineering #fintech #telecom #cloudarchitecture #securityengineering

To view or add a comment, sign in

Explore content categories