The Ultimate DevSecOps Scanning Checklist for 2025


A Modern Security Scanning Blueprint:

The Step-by-Step Checklist for Today’s Software Teams

Security isn’t just about building firewalls—it’s about embedding trust into every phase of your software delivery pipeline. In 2025, high-performing engineering teams know that comprehensive, automated scanning is a must to keep products secure, compliant, and resilient. But what should you actually be scanning—and when?

Here’s your guided tour through a world-class security scanning and monitoring program, broken down phase by phase, complete with the best-in-class tools you can use today.


1. Before You Commit: Security Starts at Your Fingertips

Don’t wait until code is merged to find secrets or vulnerabilities. Modern teams integrate key checks right into the developer’s workflow:

  • Secret Detection: Catch passwords and tokens before they ever leave your laptop (try TruffleHog, Gitleaks).
  • Code Quality & Linting: Prevent style drift and catch basic bugs early (with ESLint, Pylint).
  • Incremental SAST/SCA: Get instant feedback on vulnerabilities in the code or dependencies you just added (SonarLint, Snyk IDE plugins).

2. On Every Commit and Pull Request: Shift Security Left

CI pipelines aren’t just for running tests—they’re your first automated defense layer:

  • Static Application Security Testing (SAST): Find code-level security flaws (SonarQube, CodeQL).
  • Software Composition Analysis (SCA) & License Compliance: Keep vulnerable or risky open-source packages out of your builds (Snyk, OWASP Dependency-Check).
  • Secret Detection (repo-wide): Scan your whole history for exposed secrets (GitGuardian).
  • Infrastructure as Code (IaC) Scanning: Secure your cloud configs and deployment manifests (Checkov, TFLint).
  • Test Coverage: Measure what’s actually being tested (Jacoco, Coverage.py).
  • CI/CD Pipeline Security: Don’t forget the pipeline itself—lock down secrets and plugins (Cider Security, Legit Security).
  • Threat Modeling: For new features, proactively look for design risks (Microsoft Threat Modeling Tool).

3. Building and Storing Artifacts: Secure from the Inside Out

Don’t let vulnerabilities sneak into containers or compiled binaries:

  • Container Image Scan: Identify vulnerabilities in every OS and app layer (Trivy, Grype, AWS ECR).
  • Binary/Artifact Scan: Catch issues in compiled or packaged apps (JFrog Xray, Snyk).
  • SBOM Generation: Track every dependency with a Software Bill of Materials (Syft, CycloneDX).
  • Supply Chain Security: Ensure build integrity with signed artifacts (in-toto, SLSA, Sigstore).

4. Testing, QA, and Pre-Production: Simulate the Real World

Before going live, put your app through its paces—inside and out:

  • DAST (Dynamic Application Security Testing): Launch real attacks on your running app (OWASP ZAP, Burp Suite).
  • API Security Testing: Uncover API-specific weaknesses (42Crunch, StackHawk).
  • IAST: Instrumented runtime analysis for deep insight (Contrast Security, Veracode).
  • Fuzz Testing: Find bugs with random/malformed inputs (AFL, Jazzer, OSS-Fuzz).
  • Performance/Load Testing: Test resilience under stress (JMeter, Locust).

5. Production: Continuous Security, Not Just Compliance

Once deployed, your vigilance continues with monitoring and scanning:

  • Cloud Security Posture Management (CSPM): Constantly audit your cloud settings (Wiz, Prisma Cloud).
  • Cloud Workload Protection Platform (CWPP): Monitor running workloads for threats (Aqua, Sysdig).
  • Kubernetes Security: Lock down clusters and monitor for risks (kube-bench, kube-hunter).
  • DSPM/DLP: Discover and classify sensitive data (BigID, Varonis, AWS Macie).
  • Malware Scanning: Guard against malicious files and runtime exploits (ClamAV, CrowdStrike).
  • Network Security Monitoring: Scan for exposed services, ports, and unusual activity (Nessus, Qualys, OSSEC).
  • Continuous API Monitoring: Detect risky or anomalous API usage (Salt Security, Noname Security).
  • Compliance Auditing: Ensure you meet PCI, HIPAA, SOC2, etc. (AWS Audit Manager, Prisma Cloud).

6. Strategic & Manual Security Practices: The Human Advantage

Automation is powerful—but don’t forget people:

  • Threat Modeling: Team-based exercises to foresee and mitigate risks before code is written.
  • Manual Code Review: Human eyes on sensitive logic and complex flows.
  • Penetration Testing / Red Team: Simulated real-world attacks by skilled professionals.
  • Security Awareness Training: Ongoing education to keep everyone sharp.
  • Incident Response Exercises: Regular practice for your “fire drills.”
  • Metrics & Reporting: Track progress and coverage—what gets measured gets improved.

Wrapping Up: From Checklist to Culture

The best teams use this scanning blueprint not just as a checklist, but as a way to embed security into their engineering DNA. Assign clear owners for each scan, automate wherever you can, and revisit this process often as your tech and threat landscape evolves.


PhaseScan TypeDescriptionAutomated/ManualTool Example(s)Status
Pre-commit/IDESecret DetectionBlock secrets in code before commitAutomatedTruffleHog, Gitleaks[ ]
Code Quality & LintingStyle and bug checkingAutomatedESLint, Pylint[ ]
Incremental SAST/SCAQuick vuln scan on changeAutomatedSonarLint, Snyk IDE[ ]
Commit/CISASTCode-level vulnerabilitiesAutomatedSonarQube, CodeQL[ ]
SCA & License ComplianceThird-party lib CVEs/licensingAutomatedSnyk, OWASP DC[ ]
Secret Detection (repo-wide)Scan for secrets in all commitsAutomatedGitGuardian[ ]
IaC ScanningInfra config misconfigsAutomatedCheckov, TFLint[ ]
Test CoveragePercent of code testedAutomatedJacoco, Coverage.py[ ]
CI/CD Pipeline SecurityPipeline config, secrets, pluginsAutomatedCider, Legit[ ]
Threat ModelingNew features/arch reviewManualMS Threat Model Tool[ ]
Build/ArtifactsContainer Image ScanVulnerabilities in built imagesAutomatedTrivy, Grype, AWS ECR[ ]
Binary/Artifact ScanVulnerabilities in non-container buildsAutomatedJFrog Xray, Snyk[ ]
SBOM GenerationProduce software bill of materialsAutomatedSyft, CycloneDX[ ]
Supply Chain SecurityBuild provenance, artifact signingAutomatedin-toto, SLSA, Sigstore[ ]
Testing/QADASTExternal, runtime attacks on appAutomatedOWASP ZAP, Burp Suite[ ]
API Security TestingSpecialized API vulns (OWASP API Top 10)Automated42Crunch, StackHawk[ ]
IASTRuntime vuln detectionAutomatedContrast, Veracode[ ]
Fuzz TestingDiscover unknown/crash bugsAutomatedAFL, Jazzer, OSS-Fuzz[ ]
Performance/Load TestingDoS, concurrency issuesAutomatedJMeter, Locust[ ]
Prod/MonitoringCSPMCloud config and complianceAutomatedWiz, Prisma Cloud[ ]
CWPPRuntime protection for workloadsAutomatedAqua, Sysdig, Prisma[ ]
K8s SecurityCluster, RBAC, runtimeAutomatedkube-bench, kube-hunter[ ]
DSPM/DLPSensitive data discovery/classificationAutomatedBigID, Varonis, Macie[ ]
Malware ScanningFile system, container, host malwareAutomatedClamAV, CrowdStrike[ ]
Network Security MonitoringNetwork/host scanning, intrusionAutomatedNessus, Qualys, OSSEC[ ]
Continuous API MonitoringRuntime API risk/anomaly detectionAutomatedSalt, Noname[ ]
Compliance AuditPCI, HIPAA, SOC2, etc.AutomatedAWS Audit Manager, Prisma[ ]
Strategic/ManualThreat ModelingPre-empt threats in new designsManualWorkshops[ ]
Manual Code ReviewSecurity review of critical logicManualPeer review, checklist[ ]
Penetration Testing/Red TeamSimulate real attackersManualIn-house/third-party[ ]
Security Awareness TrainingRegular training/refreshersManualPhishing drills, eLearning[ ]
Incident Response ExercisesTabletop, blue/purple teamManualPlaybooks[ ]
Metrics/ReportingScan coverage, remediation time, risk trendsAutomated/ManualDashboards[ ]

Leave a Comment