{"id":9684,"date":"2025-07-17T19:45:25","date_gmt":"2025-07-17T11:45:25","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=9684"},"modified":"2025-07-17T19:45:26","modified_gmt":"2025-07-17T11:45:26","slug":"devsecops","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/","title":{"rendered":"How DevSecOps Turns Cyber Threats Into Customer Trust"},"content":{"rendered":"\n<p>In today\u2019s AI landscape, data reigns supreme. Experts predict that by 2027, the world will store nearly <a href=\"https:\/\/www.idc.com\/getdoc.jsp?containerId=US50397823&amp;pageType=PRINTFRIENDLY\" target=\"_blank\" rel=\"noreferrer noopener\">300 zettabytes of data<\/a>. This explosion in data volume is not only a technological shift but an ethical challenge. And as businesses increasingly collect data to enhance customer experiences, they also face growing pressure to manage sensitive information carefully.<\/p>\n\n\n\n<p>In other words, if data is king, trust is the foundation it rules from. This relationship highlights the critical importance of transparency, especially as businesses continue to adopt <a href=\"https:\/\/www.salesforce.com\/ap\/blog\/data-centric-ai\/\">Agentforce and AI apps<\/a>. And for <a href=\"https:\/\/www.salesforce.com\/ap\/agentforce\/\">Agentforce<\/a> to reach its full potential, security must be a cornerstone, not an afterthought. How? Through DevSecOps.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-consumers-trust-less-but-expect-more-from-data-use\">Consumers trust less but expect more from data use<\/h2>\n\n\n\n<p>There\u2019s a <a href=\"https:\/\/www.salesforce.com\/ap\/resources\/research-reports\/state-of-the-connected-customer\/\" target=\"_blank\" rel=\"noreferrer noopener\">disconnect<\/a> between businesses and consumers when it comes to understanding data usage. Sixty-five percent of consumers feel companies are reckless with their data, but 79% say they\u2019d trust companies more if the data use was explained.<\/p>\n\n\n\n<p>By using a unified, harmonised data platform like <a href=\"https:\/\/www.salesforce.com\/ap\/data\/\">Data Cloud<\/a>, teams can build scalable Agentforce and AI apps that operate autonomously with real-time, secure data while maintaining compliance with global privacy standards. However, with more data comes more risk, especially when dealing with Personally Identifiable Information (PII) or other sensitive data.<\/p>\n\n\n\n<p>The costs are also significant: the <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">average data breach<\/a> hovers around $4.9 million, a 10% increase from last year and a 15% increase since 2020. Meanwhile, consumer trust has been at its <a href=\"https:\/\/www.salesforce.com\/news\/stories\/ai-agents-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">lowest point in recent years<\/a>, with advances in AI making earning that trust more critical than ever.<\/p>\n\n\n\n<div class=\"layout-astro wp-block-salesforce-blog-related-trail\">\n\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__cloud\" src=\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-cloud-layout-astro.png\" alt=\"\">\n\n\t\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__background\" src=\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-background-layout-astro.png\" alt=\"\">\n\n\t<div class=\"related-trail__wrapper\">\n\t\t<div class=\"related-trail__content\">\n\t\t\t\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 345.8 82.8\" aria-hidden=\"true\" class=\"related-trail__logo\"><path fill=\"#1d3767\" d=\"M96.6 33h9v22.6h4.8V33h8.8v-4.3H96.6zm49.8 5.3c0-5.7-3.6-9.6-10.8-9.6H127v27h4.8v-7.9h3l2.3-.1 5.7 8h5.6l-7-9.2c3.4-1.6 5-4.5 5-8.2m-11.1 5.3h-3.6V33h3.6c4.4 0 6 2.3 6 5.3s-1.6 5.3-6 5.3m30.8-15.2-12.6 27.2h5l2.3-5.3h11.6l2.4 5.3h5l-12.6-27.1zm-3.6 18 4.1-9.2 4.1 9.3zm25.2-17.7h4.8v27h-4.8zm20.7 0h-4.8v27h17.6v-4.4h-12.8zm38.4 12.1h-13.2V28.7H229v27h4.7V45h13.2v10.6h4.7V28.7h-4.7zm15.9 14.8h17.5v-4.4h-12.7v-6.4H279v-4.2h-11.5v-7.5h12.7v-4.4h-17.5zm36.9-27.2L287 55.6h5l2.3-5.3H306l2.4 5.3h5l-12.6-27.1zm-3.6 18 4.1-9.2 4.1 9.3zm35.4-17.7h-10.2v27h10.2c8.2 0 14.4-5.9 14.4-13.6s-6-13.4-14.4-13.4m0 22.6H326V33h5.4a9.1 9.1 0 1 1 0 18.1z\" \/><path fill=\"#1d315f\" d=\"M43 82.8h.1a74 74 0 0 0 38.5-12.3 3 3 0 0 0 1.3-2.4v-6A66.2 66.2 0 0 0 42.5.2a3 3 0 0 0-2.3 0A66.2 66.2 0 0 0 0 62.2V68a3 3 0 0 0 1.2 2.4 74 74 0 0 0 40.2 12.4z\" \/><path fill=\"#8ed1f4\" d=\"M13.8 51.8a.3.3 0 0 0 0-.1L33 23.6a3.1 3.1 0 0 1 .8-.8 3 3 0 0 1 4 .8l9.5 13.8 3.5-5a3 3 0 0 1 4.9 0L69 51.6a.3.3 0 0 1 .1.3h7C70.7 17.7 43.7 7.2 41.4 6.2c0 0-11.2 4-21.2 16A59.6 59.6 0 0 0 6.8 51.8zm21.7-21.3\" \/><path fill=\"#aa76b3\" d=\"m62 51.9-8.7-12.6-4.2 6.1 4.8 6.4z\" \/><path fill=\"#722a87\" d=\"m49 45.4-4.4 6.4H54z\" \/><path fill=\"#8ed1f4\" d=\"m37 32.6-1.5-2.1z\" \/><path fill=\"#aa76b3\" d=\"m28 41.4 7.6 10.4h1.8l6.4-9.2-6.8-10-1.5-2.1z\" \/><path fill=\"#722a87\" d=\"m28 41.4-7 10.4h14.6z\" \/><path fill=\"#069a49\" d=\"M43.8 72.5a1.8 1.8 0 0 0-1-2.4L40.1 69a8 8 0 0 1-1-.5 7.8 7.8 0 0 1-2.4-10.7H6a44 44 0 0 0-.2 4.4v4.4A70 70 0 0 0 26 75a70 70 0 0 0 15.2 2l2.4-4.3zm33-14.8H44.3l-2.5 3a1.7 1.7 0 0 0-.2.5 1.8 1.8 0 0 0 1 2.3l2.7 1.2.7.4a7.8 7.8 0 0 1 3 10.6l-.5.9 4.8-.8a71 71 0 0 0 8.4-2.2l1.3-.4a71 71 0 0 0 14-6.7v-8.8z\" \/><path fill=\"#fff\" d=\"m46 65-.7-.3-2.7-1.2a1.8 1.8 0 0 1-1-2.4 1.7 1.7 0 0 1 .2-.4l2.5-3h-7.6A7.8 7.8 0 0 0 39 68.4a8 8 0 0 0 1 .5l2.7 1.2a1.8 1.8 0 0 1 1 2.4l-.1.2-2.5 4.3a52.5 52.5 0 0 0 7.2-.4l.5-.9A7.8 7.8 0 0 0 46 65.1z\" \/><path fill=\"#157139\" d=\"M56.9 67.3h8.8l-4.4-5zM23 71h9l-4.5-5.1zm-4.1-10.4-4.5 5h8.9z\" \/><\/svg>\n\t\t\t<h2 class=\"wp-block-related-trail__title\">Your DevSecOps solution is here<\/h2>\n\t\t\t<p>Security should never stop \u2013 and so should learning. Establish strong Salesforce DevSecOps practices on Trailhead, Salesforce\u2019s free online learning platform.<\/p>\n\t\t\t\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/trailhead.salesforce.com\/content\/learn\/modules\/development-lifecycle-management-with-flosum\" target=\"_blank\" rel=\"noreferrer noopener\">Check it out<\/a><\/div>\n\n\t\t<\/div>\n\t\t<div class=\"related-trail__mock\">\n\t\t\t<div class=\"related-trail__points\">+300 points<\/div>\n\t\t\t<div class=\"related-trail__eyebrow\">Module<\/div>\n\t\t\t<p class=\"related-trail__trail-title h3\">Learn DevSecOps Fundamentals<\/p>\n\t\t\t<p class=\"related-trail__trail-description\">Learn the ways of this trail.<\/p>\n\t\t\t<div class=\"related-trail__actions\">\n\t\t\t\t<div class=\"related-trail__action\">\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 10 10\" aria-hidden=\"true\"><path fill=\"#747474\" fill-rule=\"evenodd\" d=\"m4.93.69.88 2.88c.04.12.16.18.27.18h2.89c.29 0 .4.38.17.56L6.79 6.04c-.1.07-.13.2-.1.32l1.12 2.96c.08.27-.2.5-.44.33L4.85 7.77c-.1-.08-.23-.08-.34 0L1.97 9.65a.29.29 0 0 1-.45-.33L2.6 6.36a.3.3 0 0 0-.1-.32L.17 4.3c-.23-.18-.1-.56.17-.56h2.89c.13 0 .23-.04.27-.18l.9-2.9c.08-.27.46-.25.54.02Z\" clip-rule=\"evenodd\" \/><\/svg>\n<\/div>\n\t\t\t\t<div class=\"related-trail__action\">\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 9 5\" aria-hidden=\"true\"><path fill=\"#747474\" d=\"M4.16 4.5.26 0h7.8z\" \/><\/svg>\n<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__foreground\" src=\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-foreground-layout-astro.png\" alt=\"\">\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__parks\" src=\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-parks-layout-astro.png\" alt=\"\">\n\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What is DevSecOps? Where speed meets security&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/h2>\n\n\n\n<p>DevOps transformed software development by simplifying operations and emphasising speed, collaboration, and automation. Core practices like <a href=\"https:\/\/trailhead.salesforce.com\/content\/learn\/modules\/heroku-flow\/learn-about-continuous-integration-deployment-and-delivery\" target=\"_blank\" rel=\"noreferrer noopener\">continuous integration (CI) and continuous delivery (CD)<\/a> allowed teams to quickly build, test, and deliver applications, minimising bottlenecks and delays.\u00a0<\/p>\n\n\n\n<p>But security often got tacked on as a last-minute checkbox in the race to deliver software quickly. The result? Vulnerabilities that slipped through the cracks or, worse, costly rework discovered too late in the process.&nbsp;<\/p>\n\n\n\n<p>As a result, <a href=\"https:\/\/trailhead.salesforce.com\/content\/learn\/modules\/development-lifecycle-management-with-flosum\" target=\"_blank\" rel=\"noreferrer noopener\">DevSecOps<\/a> \u2014 short for development, security, and operations \u2014 is all about integrating security into every stage of the software development lifecycle (SDLC) rather than at the end, a practice referred to as \u201cshifting left.\u201d&nbsp;<\/p>\n\n\n\n<p>This approach allows teams to identify and catch issues during the design and development phases \u2014 when they\u2019re easier to fix and less expensive to address.&nbsp;<\/p>\n\n\n\n<p>By automating security checks, implementing traceable workflows, and ensuring constant monitoring, teams can release applications \u2014 including Agentforce \u2014 faster while maintaining the highest security standards. Features like isolated testing sandboxes, data masking to protect sensitive information, and source tracking to ensure transparency in code changes also play a key role.\u00a0<\/p>\n\n\n\n<p>This allows for quicker releases and strengthens the protection of sensitive data stored across platforms like Data Cloud. It also simplifies compliance and auditing processes, with automation creating a clear, auditable trail of every step.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Ultimately, \u201cshifting left\u201d with DevSecOps isn\u2019t just about avoiding delays; it\u2019s about creating a <a href=\"https:\/\/www.salesforceben.com\/an-interview-with-salesforces-new-chief-trust-officer-brad-arkin\/\" target=\"_blank\" rel=\"noreferrer noopener\">proactive security culture<\/a> that innovates without compromising trust. And in a world where Agentforce and AI apps are central to business success, security is non-negotiable.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Building a strong DevSecOps pipeline with the right tools<\/h2>\n\n\n\n<p>DevSecOps is more than just an upgrade to DevOps \u2014 it&#8217;s essential for building strong, future-proof Agentforce and AI apps. And regardless of the tools you use to secure your DevOps pipeline, they must work together seamlessly to maximise efficiency.\u00a0Here are key tools that often form the backbone of a DevSecOps ecosystem:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Code repositories<\/strong>: Provide version control and a centralised location for team collaboration<\/li>\n\n\n\n<li><strong>CI\/CD tools<\/strong>: Automate building, testing, and deploying applications for fast, reliable delivery<\/li>\n\n\n\n<li><strong>Vulnerability scanners<\/strong>: Identify security issues in code and dependencies early in the process<\/li>\n\n\n\n<li><strong>SAST tools<\/strong>: Analyse code to detect vulnerabilities before applications are deployed<\/li>\n\n\n\n<li><strong>Cloud security tools<\/strong>: Protect configurations and infrastructure in cloud environments<\/li>\n<\/ul>\n\n\n\n<p>Integrating these tools into a cohesive workflow can be challenging and time-consuming for some teams. And fragmented security solutions often lead to inefficiencies, gaps in coverage, and reduced visibility.&nbsp;<\/p>\n\n\n\n<p>Unified platforms are also key to truly securing data in the cloud. These platforms combine DevOps automation with built-in security features, helping simplify processes while allowing teams to focus on innovation rather than integration.\u00a0<\/p>\n\n\n\n<p>By providing real-time insights into vulnerabilities, compliance, and performance, teams can monitor security continuously without slowing development.<\/p>\n\n\n\n<div class=\"layout-five wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">Build quicker, safer, and smarter<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Wish you could move more efficiently? Learn how you can increase productivity by as much as 32% while reducing your costs \u2014 with Salesforce Sandboxes.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_blank\" href=\"https:\/\/www.salesforce.com\/ap\/form\/demo\/sandboxes-demo\/\">Show me how<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-five.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-five.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-five.png\" alt=\"\">\n\t\t\n\t<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Securing innovation at every stage with DevSecOps&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/h2>\n\n\n\n<p>As the demand for secure and scalable Agentforce and AI app development grows, <a href=\"https:\/\/www.salesforce.com\/ap\/platform\/\">Salesforce Platform<\/a> embraces DevSecOps principles to integrate security into every development lifecycle stage.\u00a0<\/p>\n\n\n\n<p>By providing tools that infuse security into development workflows, Salesforce supports teams in delivering innovative solutions while maintaining trust. For example, automated testing, continuous monitoring, and compliance tracking help teams streamline workflows and reduce risks.&nbsp;<\/p>\n\n\n\n<p>Additionally, source tracking and <a href=\"https:\/\/www.salesforce.com\/ap\/platform\/data-masking\/what-is-data-masking\/\">data masking<\/a> make auditing every step of the development lifecycle easier. And with sign-offs and traceability built into the lifecycle, auditors can easily follow the flow of commits, ensuring security and compliance at every stage.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69de34bf618ee&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69de34bf618ee\" class=\"wp-block-image size-full wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"3840\" height=\"2224\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.salesforce.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/06\/New-DevSecOps-Loop-Graphic-2.png?strip=all&#038;quality=95\" alt=\"\" class=\"wp-image-9683\" srcset=\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2025\/06\/New-DevSecOps-Loop-Graphic-2.png 3840w, https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2025\/06\/New-DevSecOps-Loop-Graphic-2.png?w=300&amp;h=174 300w, https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2025\/06\/New-DevSecOps-Loop-Graphic-2.png?w=768&amp;h=445 768w, https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2025\/06\/New-DevSecOps-Loop-Graphic-2.png?w=1024&amp;h=593 1024w, https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2025\/06\/New-DevSecOps-Loop-Graphic-2.png?w=1536&amp;h=890 1536w, https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2025\/06\/New-DevSecOps-Loop-Graphic-2.png?w=2048&amp;h=1186 2048w, https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2025\/06\/New-DevSecOps-Loop-Graphic-2.png?w=150&amp;h=87 150w\" sizes=\"auto, (max-width: 3840px) 100vw, 3840px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p>With Salesforce, teams can support each phase of their development lifecycle with integrated, dedicated tools:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Plan<\/strong>: Tools like Backup and Recover and <a href=\"https:\/\/help.salesforce.com\/s\/articleView?id=sf.einstein_data_detect.htm&amp;type=5\" target=\"_blank\" rel=\"noreferrer noopener\">Data Detect<\/a> help manage environments and protect sensitive information<\/li>\n\n\n\n<li><strong>Build<\/strong>: <a href=\"https:\/\/www.salesforce.com\/ap\/platform\/low-code-development-platform\/\">Low-code builders<\/a> and <a href=\"https:\/\/help.salesforce.com\/s\/articleView?id=sf.security_pe_concepts.htm&amp;language=en_US&amp;type=5\" target=\"_blank\" rel=\"noreferrer noopener\">Platform Encryption<\/a> ensure secure and efficient app creation<\/li>\n\n\n\n<li><strong>Test<\/strong>: <a href=\"https:\/\/www.salesforce.com\/ap\/form\/platform\/data-mask-form\/\" target=\"_blank\" rel=\"noreferrer noopener\">Data Mask and Seed<\/a>, <a href=\"https:\/\/help.salesforce.com\/s\/articleView?id=sf.real_time_event_monitoring_overview.htm&amp;type=5\" target=\"_blank\" rel=\"noreferrer noopener\">Event Monitoring<\/a>, and <a href=\"https:\/\/www.salesforce.com\/ap\/platform\/sandboxes-environments\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sandboxes <\/a>help safeguard data integrity during testing<\/li>\n\n\n\n<li><strong>Release<\/strong>: <a href=\"https:\/\/help.salesforce.com\/s\/articleView?id=000388902&amp;type=1\" target=\"_blank\" rel=\"noreferrer noopener\">Hyperforce <\/a>is a secure cloud-based architecture by default, with least-privileged control, zero-trust principles, and encryption of customer data at rest and in transit<\/li>\n\n\n\n<li><strong>Observe<\/strong>: <a href=\"https:\/\/developer.salesforce.com\/docs\/atlas.en-us.234.0.field_history_retention.meta\/field_history_retention\/field_audit_trail.htm\" target=\"_blank\" rel=\"noreferrer noopener\">Field Audit Trail<\/a>, <a href=\"https:\/\/www.salesforce.com\/ap\/platform\/security-center\/\">Security Centre<\/a>, and <a href=\"https:\/\/www.salesforce.com\/ap\/platform\/privacy-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">Privacy Centre<\/a> provide real-time insights for ongoing compliance<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-building-trust-through-devsecops\">Building trust through DevSecOps<\/h2>\n\n\n\n<p>In modern Agentforce and AI app development, security is a given. It must be integrated into every part of your operations, ensuring no process or app is left unprotected. A robust <a href=\"https:\/\/www.salesforce.com\/ap\/platform\/devops-tools\/\">DevSecOps strategy<\/a> makes privacy and security a natural part of your development and data pipelines.\u00a0<\/p>\n\n\n\n<p>By embedding security from the start, you\u2019re not just safeguarding your systems but protecting the trust your customers expect.<\/p>\n\n\n\n<div class=\"layout-four wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">Build, configure and secure your Agentforce and AI apps on the Salesforce Platform<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Tour the #1 platform for digital transformation<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_blank\" href=\"https:\/\/www.salesforce.com\/ap\/form\/platform\/guided-tour\/\">Take the guided tour<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-four.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-four.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-four.png\" alt=\"\">\n\t\t\n\t<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security shouldn\u2019t be an afterthought. With DevSecOps, it\u2019s built in, ensuring compliance and keeping your AI initiatives on track.<\/p>\n","protected":false},"author":528,"featured_media":9682,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"bf28922d733e463ebcbdccd5AP","post_meta_title":"","ai_synopsis":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[528,211,540,162,161,14],"sf_content_type":[],"coauthors":[307],"class_list":["post-9684","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_topic-salesforce-platform","sf_topic-data-culture","sf_topic-data","sf_topic-developer","sf_topic-low-code","sf_topic-it"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How DevSecOps Builds Trust with Every Commit<\/title>\n<meta name=\"description\" content=\"Discover how DevSecOps strengthens cloud security, ensures compliance, and builds customer trust by protecting sensitive data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How DevSecOps Turns Cyber Threats Into Customer Trust\" \/>\n<meta property=\"og:description\" content=\"Discover how DevSecOps strengthens cloud security, ensures compliance, and builds customer trust by protecting sensitive data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-17T11:45:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-17T11:45:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2024\/12\/TSK-38929_How_DevSecOps_Turn_Cyber_Threats_into_Customer_Trust.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"844\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Salesforce Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Salesforce Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/06fa0bccdbf9a256843c9bf5d694c153\"}],\"headline\":\"How DevSecOps Turns Cyber Threats Into Customer Trust\",\"datePublished\":\"2025-07-17T11:45:25+00:00\",\"dateModified\":\"2025-07-17T11:45:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/\"},\"wordCount\":1018,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2024\/12\/TSK-38929_How_DevSecOps_Turn_Cyber_Threats_into_Customer_Trust.jpg\",\"inLanguage\":\"en-SG\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/\",\"url\":\"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/\",\"name\":\"How DevSecOps Builds Trust with Every Commit\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2024\/12\/TSK-38929_How_DevSecOps_Turn_Cyber_Threats_into_Customer_Trust.jpg\",\"datePublished\":\"2025-07-17T11:45:25+00:00\",\"dateModified\":\"2025-07-17T11:45:26+00:00\",\"author\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/68d7faf82a064e16a2c8fbfc4db5f6da\"},\"description\":\"Discover how DevSecOps strengthens cloud security, ensures compliance, and builds customer trust by protecting sensitive data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#breadcrumb\"},\"inLanguage\":\"en-SG\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-SG\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2024\/12\/TSK-38929_How_DevSecOps_Turn_Cyber_Threats_into_Customer_Trust.jpg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2024\/12\/TSK-38929_How_DevSecOps_Turn_Cyber_Threats_into_Customer_Trust.jpg\",\"width\":1500,\"height\":844,\"caption\":\"DevSecOps can enhance the security and efficiency of your agentic AI initiatives.[Image: inspiring.team \/ Adobe Stock]\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.salesforce.com\/ap\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How DevSecOps Turns Cyber Threats Into Customer Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/ap\/blog\/\",\"name\":\"Salesforce\",\"description\":\"News, tips, and insights from the global cloud leader\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/ap\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-SG\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/06fa0bccdbf9a256843c9bf5d694c153\",\"name\":\"Salesforce Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-SG\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/87753ffcc5acd9c82a76d2a240acf2a2\",\"url\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/09\/salesforce-avatar-e1666571807979.webp?w=150&h=150&crop=1\",\"contentUrl\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/09\/salesforce-avatar-e1666571807979.webp?w=150&h=150&crop=1\",\"width\":\"150\",\"height\":\"150\",\"caption\":\"Salesforce Staff\"},\"description\":\"Salesforce is the #1 AI CRM. We're immersed in the world of customer relationship management, helping businesses unlock the full potential of their data and connect with their customers in more meaningful ways. Whether it\u2019s using AI to improve service or streamlining sales processes, we're passionate about the tools and strategies that help our customers succeed in the digital age.\",\"url\":\"https:\/\/www.salesforce.com\/ap\/blog\/author\/salesforce-staff\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How DevSecOps Builds Trust with Every Commit","description":"Discover how DevSecOps strengthens cloud security, ensures compliance, and builds customer trust by protecting sensitive data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/","og_type":"article","og_title":"How DevSecOps Turns Cyber Threats Into Customer Trust","og_description":"Discover how DevSecOps strengthens cloud security, ensures compliance, and builds customer trust by protecting sensitive data.","og_url":"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/","og_site_name":"Salesforce","article_published_time":"2025-07-17T11:45:25+00:00","article_modified_time":"2025-07-17T11:45:26+00:00","og_image":[{"width":1500,"height":844,"url":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2024\/12\/TSK-38929_How_DevSecOps_Turn_Cyber_Threats_into_Customer_Trust.jpg","type":"image\/jpeg"}],"author":"Salesforce Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Salesforce Staff","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/06fa0bccdbf9a256843c9bf5d694c153"}],"headline":"How DevSecOps Turns Cyber Threats Into Customer Trust","datePublished":"2025-07-17T11:45:25+00:00","dateModified":"2025-07-17T11:45:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/"},"wordCount":1018,"commentCount":0,"image":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2024\/12\/TSK-38929_How_DevSecOps_Turn_Cyber_Threats_into_Customer_Trust.jpg","inLanguage":"en-SG","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/","url":"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/","name":"How DevSecOps Builds Trust with Every Commit","isPartOf":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2024\/12\/TSK-38929_How_DevSecOps_Turn_Cyber_Threats_into_Customer_Trust.jpg","datePublished":"2025-07-17T11:45:25+00:00","dateModified":"2025-07-17T11:45:26+00:00","author":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/68d7faf82a064e16a2c8fbfc4db5f6da"},"description":"Discover how DevSecOps strengthens cloud security, ensures compliance, and builds customer trust by protecting sensitive data.","breadcrumb":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#breadcrumb"},"inLanguage":"en-SG","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/"]}]},{"@type":"ImageObject","inLanguage":"en-SG","@id":"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#primaryimage","url":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2024\/12\/TSK-38929_How_DevSecOps_Turn_Cyber_Threats_into_Customer_Trust.jpg","contentUrl":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2024\/12\/TSK-38929_How_DevSecOps_Turn_Cyber_Threats_into_Customer_Trust.jpg","width":1500,"height":844,"caption":"DevSecOps can enhance the security and efficiency of your agentic AI initiatives.[Image: inspiring.team \/ Adobe Stock]"},{"@type":"BreadcrumbList","@id":"https:\/\/www.salesforce.com\/ap\/blog\/devsecops\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.salesforce.com\/ap\/blog\/"},{"@type":"ListItem","position":2,"name":"How DevSecOps Turns Cyber Threats Into Customer Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/ap\/blog\/#website","url":"https:\/\/www.salesforce.com\/ap\/blog\/","name":"Salesforce","description":"News, tips, and insights from the global cloud leader","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/ap\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-SG"},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/06fa0bccdbf9a256843c9bf5d694c153","name":"Salesforce Staff","image":{"@type":"ImageObject","inLanguage":"en-SG","@id":"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/87753ffcc5acd9c82a76d2a240acf2a2","url":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/09\/salesforce-avatar-e1666571807979.webp?w=150&h=150&crop=1","contentUrl":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/09\/salesforce-avatar-e1666571807979.webp?w=150&h=150&crop=1","width":"150","height":"150","caption":"Salesforce Staff"},"description":"Salesforce is the #1 AI CRM. We're immersed in the world of customer relationship management, helping businesses unlock the full potential of their data and connect with their customers in more meaningful ways. Whether it\u2019s using AI to improve service or streamlining sales processes, we're passionate about the tools and strategies that help our customers succeed in the digital age.","url":"https:\/\/www.salesforce.com\/ap\/blog\/author\/salesforce-staff\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2024\/12\/TSK-38929_How_DevSecOps_Turn_Cyber_Threats_into_Customer_Trust.jpg","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/ap\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/posts\/9684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/users\/528"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/comments?post=9684"}],"version-history":[{"count":3,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/posts\/9684\/revisions"}],"predecessor-version":[{"id":9689,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/posts\/9684\/revisions\/9689"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/media\/9682"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/media?parent=9684"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/sf_topic?post=9684"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/sf_content_type?post=9684"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/coauthors?post=9684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}