CI/CD Security
CI/CD security refers to the security practices and safeguards built into the automated pipelines that build, test, and deploy software. It aims to protect each stage of the pipeline from code integration through to delivery, preventing attackers from using the pipeline as a path to introduce malicious code or compromise production systems. These practices typically include access controls, secret management, dependency scanning, and policy enforcement at multiple points in the pipeline.
CI/CD security is the distribution of security controls, compliance safeguards, and risk management practices across the continuous integration and continuous delivery pipeline. It addresses threats at the code, build, test, and deployment stages, encompassing concerns such as source code integrity, build environment isolation, artifact provenance, secrets management, access control for pipeline infrastructure, and the security of third-party dependencies and tooling integrated into the pipeline. Because the pipeline automates the path from developer commit to production, a compromise at any stage may allow an adversary to tamper with build artifacts, exfiltrate secrets, or deploy malicious code without direct access to production systems. Effective CI/CD security requires controls at both the static analysis layer (such as SAST and SCA tooling executed during build steps) and the runtime or deployment layer (such as image scanning, policy enforcement gates, and environment hardening), as neither layer alone provides sufficient coverage.
Why it matters
CI/CD pipelines occupy a uniquely privileged position in a software organization's infrastructure. Because the pipeline automates the path from a developer's commit to production, a successful compromise at any stage can allow an adversary to tamper with build artifacts, exfiltrate secrets, or deploy malicious code without ever gaining direct access to production systems. This makes the pipeline an attractive target: rather than attacking a hardened production environment, an attacker may find it easier to subvert the build process itself.
Who it's relevant to
Inside CI/CD Security
Common questions
Answers to the questions practitioners most commonly ask about CI/CD Security.