Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/sonatype-nexus-community/devsecops-community-survey
The question set used for the DevSecOps Community Survey
https://github.com/sonatype-nexus-community/devsecops-community-survey
appsec automation culture development devops devsecops pipeline security survey
Last synced: about 1 month ago
JSON representation
The question set used for the DevSecOps Community Survey
- Host: GitHub
- URL: https://github.com/sonatype-nexus-community/devsecops-community-survey
- Owner: sonatype-nexus-community
- License: mit
- Created: 2020-04-16T15:28:12.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2020-12-16T22:29:46.000Z (about 4 years ago)
- Last Synced: 2024-07-29T17:54:49.026Z (5 months ago)
- Topics: appsec, automation, culture, development, devops, devsecops, pipeline, security, survey
- Homepage: https://sonatype.com/2020Survey
- Size: 20.5 KB
- Stars: 2
- Watchers: 11
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Security: SECURITY.md
Awesome Lists containing this project
README
# DevSecOps Community Survey Questions
## Overview
As part of our Sonatype's commitment to DevSecOps and to determine the pulse of DevSecOps in our community, we've decided to open source the questions we used for the 2020 DevSecOps Community Survey.
The latest DevSecOps Community Survey results can be found at [https://sonatype.com/2020Survey](https://sonatype.com/2020Survey)
### Contributions
*We encourage you to contribute!*
Please feel free to clone this repository and create a pull request so we can review your suggestions and potentially include them in the survey. Suggestions that are accepted and merged into these survey questions will be used in next year's DevSecOps Community Survey.
If you need help creating a Pull Request, you can reference Github's documentation [here](https://help.github.com/en/github/collaborating-with-issues-and-pull-requests/creating-a-pull-request)
## The Survey
### Welcome! Let's start with a view of your organization.
*All answers are kept completely anonymous and private, we only share aggregated statistics. As a survey participant, you will receive a copy of the results once compiled into our final survey document (email address required).*
\* Identifies required questions
#### * 1. What is your industry?
![](img/singleselect.png)Banking and Financial Services
![](img/singleselect.png)Technology
![](img/singleselect.png)Telecommunications
![](img/singleselect.png)Manufacturing
![](img/singleselect.png)Consulting Services
![](img/singleselect.png)Government
![](img/singleselect.png)Media and Entertainment Healthcare
![](img/singleselect.png)Retail
![](img/singleselect.png)Education
![](img/singleselect.png)Insurance
![](img/singleselect.png)Other (please specify)
#### * 2. How many of each role are in your organization? (It's okay to guess)
| | <10 | <25 | <50 | <100 | <500 | <1000 | <5000 | >5000 |
| ---------- | ------------------------- | ------------------------- | ------------------------- | ------------------------- | ------------------------- | ------------------------- | ------------------------- | ------------------------- |
| Developers | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| Security | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| Operations | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |#### * 3. What title best matches your role?
![](img/singleselect.png)Developer (Sr., Jr., Lead)
![](img/singleselect.png)Team Lead
![](img/singleselect.png)Architect (Sr., Jr., Lead, Security)
![](img/singleselect.png)Build Manager
![](img/singleselect.png)IT Manager
![](img/singleselect.png)IT Operations
![](img/singleselect.png)DevOps
![](img/singleselect.png)Application Security
![](img/singleselect.png)QA / Test
![](img/singleselect.png)CISO / CTO / CIO / CEO / VP
![](img/singleselect.png)Information Security
![](img/singleselect.png)Product Owner
![](img/singleselect.png)Other (please specify)
#### * 4. What is your level of seniority?
![](img/singleselect.png)Individual contributor (e.g., Junior, Senior)
![](img/singleselect.png)Manager (e.g., Director, Sr. Director)
![](img/singleselect.png)Executive (e.g., VP, CIO, CISO, CTO)
#### * 5. What type of applications do you or your team generally work on?
![](img/multiselect.png)Web
![](img/multiselect.png)Microservice
![](img/multiselect.png)Phone
![](img/multiselect.png)Tablet
![](img/multiselect.png)Wearables
![](img/multiselect.png)Embedded
![](img/multiselect.png)IoT
![](img/multiselect.png)Desktop
#### * 6. What is your team's main motivation to implement security controls?
![](img/singleselect.png)Customer requirements
![](img/singleselect.png)Risk management
![](img/singleselect.png)Compliance requirements
![](img/singleselect.png)Competitive advantage
![](img/singleselect.png)Improve quality of the code / application
![](img/singleselect.png)Other (please specify)
### Culture
#### * 7. Tell us about your job satisfaction
| | Strongly Agree | Agree | Neutral | Disagree | Strongly Disagree |
| ----------------------------------------------------------- | ------------------------- | ------------------------- | ------------------------- | ------------------------- | ------------------------- |
| I am satisfied with my job | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| I would recommend this organization as a good place to work | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| I have the tools and resources to do my job well | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| My job makes good use of my skills and abilities | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| I can complete the work I set out to achieve | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |#### * 8. What application security training is available to you?
![](img/singleselect.png)E-learning (self-paced)
![](img/singleselect.png)Secure coding/programming
![](img/singleselect.png)Instructor led (online)
![](img/singleselect.png)Instructor led (classroom)
![](img/singleselect.png)What training?
#### * 9. Who causes the most friction on your team?
![](img/singleselect.png)Developers
![](img/singleselect.png)Security
![](img/singleselect.png)Operations
![](img/singleselect.png)Management
![](img/singleselect.png)Executives
![](img/singleselect.png)QA/Test
![](img/singleselect.png)Product
![](img/singleselect.png)None
![](img/singleselect.png)Other (please specify)
#### * 10. How would you characterize developer interest in application security?
![](img/singleselect.png)It's a top concern for our developers, they spend a lot of time here
![](img/singleselect.png)Developers know it's important, but they don't have the time to spend on it
![](img/singleselect.png)Developers do what they have to do, but it's another groups responsibility
![](img/singleselect.png)It's not something our developers are focused on
#### 11. Who is your favorite mercenary?
![](img/singleselect.png)Deadpool
### Development
#### * 12. Which development practices does your team use?
![](img/multiselect.png)DevOps
![](img/multiselect.png)DevSecOps
![](img/multiselect.png)CI/CD (Automated, Not DevOps)
![](img/multiselect.png)Waterfall
![](img/multiselect.png)SAFe
![](img/multiselect.png)Agile
![](img/multiselect.png)Lean
#### * 13. How mature is your team's adoption of the selected development practices?
![](img/singleselect.png)Very mature
![](img/singleselect.png)Somewhat mature
![](img/singleselect.png)Improving maturity
![](img/singleselect.png)Not very mature
![](img/singleselect.png)Not sure
#### * 14. How frequently do you or your team deploy to production?
![](img/singleselect.png)With every change
![](img/singleselect.png)Multiple times a day
![](img/singleselect.png)Multiple times a week
![](img/singleselect.png)Once per week
![](img/singleselect.png)Every few weeks
![](img/singleselect.png)Monthly
![](img/singleselect.png)Multiple times a year
![](img/singleselect.png)Yearly
#### * 15. How are you informed of application security issues?
![](img/multiselect.png)Tooling
![](img/multiselect.png)Customers
![](img/multiselect.png)Manager/boss
![](img/multiselect.png)Broadcast email
![](img/multiselect.png)Security team
![](img/multiselect.png)Chat
![](img/multiselect.png)IDE Integration
![](img/multiselect.png)Rumor
![](img/multiselect.png)Media
#### 16. What's your favorite pizza topping? (Please Specify)
### Tooling
#### * 17. What security tools do you or your team use?
| | We Use Frequently, Critical | We Use Sometimes, Not Critical | Don't Use |
| --------------------------------------------------------- | --------------------------- | ------------------------------ | ------------------------- |
| CSA - Container and Infrastructure Security Analysis | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| DAST - Dynamic Application Security Testing | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| DLP - Data Loss Prevention | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| IAST - Interactive Application Security Testing | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| IDS/IPS - Intrusion Detection and/or Intrusion Prevention | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| OSS - Open Source Software Scanning | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| RASP - Runtime Application Self Protection | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| SAST - Static Application Security Testing | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| SCA - Software Composition Analysis | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| WAF - Web Application Firewall | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |#### * 18. Are security tools properly integrated within your team's development pipeline?
| | Yes | No | N/A |
| --------------------------------------------------------- | ------------------------- | ------------------------- | ------------------------- |
| CSA - Container and Infrastructure Security Analysis | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| DAST - Dynamic Application Security Testing | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| DLP - Data Loss Prevention | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| IAST - Interactive Application Security Testing | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| IDS/IPS - Intrusion Detection and/or Intrusion Prevention | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| OSS - Open Source Software Scanning | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| RASP - Runtime Application Self Protection | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| SAST - Static Application Security Testing | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| SCA - Software Composition Analysis | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| WAF - Web Application Firewall | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |#### * 19. Which description best fits the integration of your security tools with the DevOps pipeline?
![](img/singleselect.png)Not integrated, it’s a completely separate process
![](img/singleselect.png)Partially integrated, data flows from tool to tool but requires manual intervention
![](img/singleselect.png)Fully integrated, but requires manual step
![](img/singleselect.png)Fully integrated and automated
#### * 20. When does your team perform manual or automated security analysis?
| | Manual | Autonmated | Do not perform |
| --------------------------- | ------------------------- | ------------------------- | ------------------------- |
| Design/Architecture | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| Development | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| Upon Checkin | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| During Build | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| During QA/Test | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| Prior to Production Release | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| In Production | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| All of the above | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |### Policy, Governance, and Compliance
#### * 21. Are governance and compliance automated in your team's development process?
![](img/singleselect.png)Yes
![](img/singleselect.png)No
![](img/singleselect.png)Not Sure
#### * 22. Does your team automate separation of duties?
![](img/singleselect.png)Yes
![](img/singleselect.png)No
![](img/singleselect.png)Not Sure
#### * 23. Does your organization have an open source governance policy? (i.e., rules about using good, not bad, components/libraries/binaries)
![](img/singleselect.png)Yes
![](img/singleselect.png)No
![](img/singleselect.png)Not Sure
#### * 24. Do you follow the open source governance policy?
![](img/singleselect.png)Yes
![](img/singleselect.png)No
![](img/singleselect.png)Not Sure
#### * 25. Does your team maintain an inventory of open source components? (e.g., a software bill of materials (SBoM))
![](img/singleselect.png)Yes, for all components including dependencies
![](img/singleselect.png)Yes, for for all components, but **NOT** dependencies
![](img/singleselect.png)No
![](img/singleselect.png)Not sure
#### * 26. Which one?
![](img/singleselect.png)Star Wars
![](img/singleselect.png)Star Trek
![](img/singleselect.png)Who Cares?
### Challenges
#### * 27. Rate the following challenges with your application security processes
| | Very challenging | Somewhat challenging | Not challenging | N/A |
| -------------------------------------------------- | ------------------------- | ------------------------- | ------------------------- | ------------------------- |
| We find out about problems too late in the process | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| Slows down development | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| Too many false positives | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| Not clear of what's expected of us | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| No enforcement, workarounds are common | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| Addresses source code but not components | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |
| Mobile application testing | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) | ![](img/singleselect.png) |#### * 28. Has your organization had a breach that can be attributed to a vulnerability in an open source component or dependency in the last 12 months?
![](img/singleselect.png)Yes, we definitely have
![](img/singleselect.png)We suspect that this was the source of a breach
![](img/singleselect.png)No, we definitely have not
![](img/singleselect.png)Not Sure
#### * 29. Has your organization had a breach attributed to application development and deployment in the last 12 months?
![](img/singleselect.png)Yes, we definitely have
![](img/singleselect.png)We suspect that this was the source of a breach
![](img/singleselect.png)No, we definitely have not
![](img/singleselect.png)Not Sure
### One last question...
**30. LAST QUESTION: Tell us why DevSecOps practices are important to you. We may include your entry in the DevSecOps Community survey report.**