The idea of automating security checks for applications has evolved as cyber threats have increased. Initially, security testing was almost entirely manual, but the development of DevOps and automation allowed for the integration of security checks into CI/CD pipelines.
In the early years, manual penetration testing (pentesting) and scanners were the only tools for vulnerability assessments. Later, separate automated scanners began to emerge in development, followed by entire platforms that integrate into processes.
Key Features:
Is it possible to find all vulnerabilities solely with automated tests?
No, automated checks cover only a portion of security risks (e.g., XSS, SQL injections). Manual auditing is also necessary for completeness.
Is one type of scanner — SAST or DAST — sufficient for quality protection?
No, SAST analyzes code statically before the application runs, while DAST evaluates the application’s behavior during operation. Both should be used, along with considering additional methods.
Should security tests in CI/CD be disabled to accelerate deployment?
No, this approach is dangerous — it jeopardizes product security.
Security is only checked through manual analysis at the release stage and occasionally with a scanner; reports are not integrated into CI/CD.
Pros:
Cons:
Security tests are deployed automatically in CI/CD; critical vulnerabilities block releases; rules for filtering false positives are configured; additional pentest sessions are held quarterly.
Pros:
Cons: