Pipeline Security
Pipeline security is the practice of protecting the systems, tools, and processes used to build, test, and deploy software from cyber threats and vulnerabilities. It focuses on ensuring that each stage of the software development and delivery lifecycle cannot be compromised or tampered with. This helps prevent attackers from injecting malicious code or gaining unauthorized access through the build and deployment process.
Pipeline security refers to the protection of software development and deployment pipelines, encompassing the systems, tools, processes, and integrations involved in building, testing, and releasing software. In the application security and software supply chain context, it typically covers controls applied across CI/CD stages, including source code integrity, dependency validation, build environment isolation, artifact signing and verification, and deployment gate enforcement. Practitioners distinguish pipeline security from broader infrastructure security in that its scope is bounded to the software delivery workflow rather than general network or endpoint protection. Note: the term 'pipeline security' may also refer, in critical infrastructure contexts, to the physical and cyber protection of oil, gas, or other material transport pipelines as addressed by TSA and CISA programs; the two usages are distinct and should not be conflated.
Why it matters
The software build and deployment pipeline has become one of the most targeted attack surfaces in modern software development. Because pipelines have privileged access to source code, secrets, build infrastructure, and production deployment mechanisms, a compromise at any stage can propagate malicious changes across every downstream artifact and environment. Attackers who gain a foothold in a CI/CD pipeline can inject backdoors into software before it is signed and shipped, bypassing many traditional endpoint and network controls that would otherwise detect tampering.
Real-world incidents have demonstrated the severity of pipeline compromises. The SolarWinds attack, for example, involved adversaries inserting malicious code into the software build process, resulting in trojanized updates distributed to thousands of customers. This class of attack is particularly difficult to detect because the malicious code is introduced during the legitimate build process, causing signed and verified artifacts to carry the compromise. Pipeline security controls aim to reduce this risk by establishing integrity checks, access restrictions, and auditability at each stage of the delivery workflow.
As organizations increasingly rely on automation, third-party integrations, and shared build infrastructure, the attack surface of a typical pipeline grows correspondingly. Compromised dependencies, misconfigured secrets management, and overly permissive pipeline credentials are among the most common vectors practitioners encounter. Addressing pipeline security is therefore not only a technical concern but also an organizational one, requiring clear ownership, policy enforcement, and continuous monitoring across the full software delivery lifecycle.
Who it's relevant to
Inside Pipeline Security
Common questions
Answers to the questions practitioners most commonly ask about Pipeline Security.