<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog | Continuous Deployment of Capability</title><link href="http://sei.cmu.edu/feeds/topic/continuous-deployment-capability/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://sei.cmu.edu/feeds/topic/continuous-deployment-capability/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://sei.cmu.edu/feeds/topic/continuous-deployment-capability/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2025-07-14T00:00:00-04:00</updated><subtitle>Updates on changes and additions to the                         SEI Blog for posts matching Continuous Deployment of Capability</subtitle><entry><title>A Practitioner-Focused DevSecOps Assessment Approach</title><link href="https://www.sei.cmu.edu/blog/a-practitioner-focused-devsecops-assessment-approach/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-07-14T00:00:00-04:00</published><updated>2025-07-14T00:00:00-04:00</updated><author><name>Aaron Reffett, Timothy A. Chick</name></author><id>https://www.sei.cmu.edu/blog/a-practitioner-focused-devsecops-assessment-approach/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Regular DevSecOps assessments are necessary to track progress, adapt to evolving needs, and ensure you are consistently delivering value to your end users with speed, security, and efficiency.</summary></entry><entry><title>A 5-Stage Process for Automated Testing and Delivery of Complex Software Systems</title><link href="https://www.sei.cmu.edu/blog/a-5-stage-process-for-automated-testing-and-delivery-of-complex-software-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-05-21T00:00:00-04:00</published><updated>2025-05-21T00:00:00-04:00</updated><author><name>Caden Milne, Lyndsi Hughes</name></author><id>https://www.sei.cmu.edu/blog/a-5-stage-process-for-automated-testing-and-delivery-of-complex-software-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Managing and maintaining deployments of complex software present engineers with a multitude of challenges including security vulnerabilities.</summary></entry><entry><title>The DevSecOps Capability Maturity Model</title><link href="https://www.sei.cmu.edu/blog/the-devsecops-capability-maturity-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-03-10T00:00:00-04:00</published><updated>2025-03-10T00:00:00-04:00</updated><author><name>Timothy A. Chick, Brent Frye, Aaron Reffett</name></author><id>https://www.sei.cmu.edu/blog/the-devsecops-capability-maturity-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Implementing DevSecOps can improve multiple aspects of the effectiveness of a software organization and the quality of the software for which it is responsible.</summary></entry><entry><title>Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Cross-Program Dependencies</title><link href="https://www.sei.cmu.edu/blog/acquisition-archetypes-seen-in-the-wild-devsecops-edition-cross-program-dependencies/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-09-03T00:00:00-04:00</published><updated>2024-09-03T00:00:00-04:00</updated><author><name>William Novak</name></author><id>https://www.sei.cmu.edu/blog/acquisition-archetypes-seen-in-the-wild-devsecops-edition-cross-program-dependencies/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Shared capabilities can help manage costs and complexities but can also result in cross-program dependencies. This post examines this phenomenon in a DevSecOps context.</summary><category term="Acquisition Transformation"/></entry><entry><title>Cultivating Kubernetes on the Edge</title><link href="https://www.sei.cmu.edu/blog/cultivating-kubernetes-on-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-07-08T00:00:00-04:00</published><updated>2024-07-08T00:00:00-04:00</updated><author><name>Patrick Earl, Jeffrey Hamed, Doug Reynolds, José Morales</name></author><id>https://www.sei.cmu.edu/blog/cultivating-kubernetes-on-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Members of the SEI DevSecOps Innovation team were asked to explore an alternative to VMware’s vSphere Hypervisor in an edge compute environment. This post explores their prototype.</summary></entry><entry><title>Polar: Improving DevSecOps Observability</title><link href="https://www.sei.cmu.edu/blog/polar-improving-devsecops-observability/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-05-06T00:00:00-04:00</published><updated>2024-05-06T00:00:00-04:00</updated><author><name>Morgan Farrah, Vaughn Coates, Patrick Earl</name></author><id>https://www.sei.cmu.edu/blog/polar-improving-devsecops-observability/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post introduces Polar, a DevSecOps framework developed as a solution to the limitations of traditional batch data processing.</summary></entry><entry><title>Example Case: Using DevSecOps to Redefine Minimum Viable Product</title><link href="https://www.sei.cmu.edu/blog/example-case-using-devsecops-to-redefine-minimum-viable-product/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-03-11T00:00:00-04:00</published><updated>2024-03-11T00:00:00-04:00</updated><author><name>Joseph Yankel</name></author><id>https://www.sei.cmu.edu/blog/example-case-using-devsecops-to-redefine-minimum-viable-product/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI blog post, authored by SEI interns, describes their work on a microservices-based software application, an accompanying DevSecOps pipeline, and an expansion of the concept of minimum viable product to minimum viable process.</summary></entry><entry><title>Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Clinging to the Old Ways</title><link href="https://www.sei.cmu.edu/blog/acquisition-archetypes-seen-in-the-wild-devsecops-edition-clinging-to-the-old-ways/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-12-18T00:00:00-05:00</published><updated>2023-12-18T00:00:00-05:00</updated><author><name>William Novak</name></author><id>https://www.sei.cmu.edu/blog/acquisition-archetypes-seen-in-the-wild-devsecops-edition-clinging-to-the-old-ways/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI blog post draws on SEI experiences conducting independent technical assessments to examine problems common to disparate acquisition programs. It also provides recommendations for recovering from these problems and preventing them from recurring.</summary><category term="Acquisition Transformation"/></entry><entry><title>Extending Agile and DevSecOps to Improve Efforts Tangential to Software Product Development</title><link href="https://www.sei.cmu.edu/blog/extending-agile-and-devsecops-to-improve-efforts-tangential-to-software-product-development/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-08-07T00:00:00-04:00</published><updated>2023-08-07T00:00:00-04:00</updated><author><name>David Sweeney, Lyndsi Hughes</name></author><id>https://www.sei.cmu.edu/blog/extending-agile-and-devsecops-to-improve-efforts-tangential-to-software-product-development/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The modern software engineering practices of Agile and DevSecOps have revolutionized the practice of software engineering. This blog post explores use of these practices in capability delivery and business mission.</summary></entry><entry><title>5 Challenges to Implementing DevSecOps and How to Overcome Them</title><link href="https://www.sei.cmu.edu/blog/5-challenges-to-implementing-devsecops-and-how-to-overcome-them/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-06-12T00:00:00-04:00</published><updated>2023-06-12T00:00:00-04:00</updated><author><name>Joseph Yankel, Hasan Yasar</name></author><id>https://www.sei.cmu.edu/blog/5-challenges-to-implementing-devsecops-and-how-to-overcome-them/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The shift from project- to program-level thinking raises numerous challenges to DevSecOps implementation. This SEI Blog post articulates these challenges and ways to overcome them.</summary></entry><entry><title>Actionable Data from the DevSecOps Pipeline</title><link href="https://www.sei.cmu.edu/blog/actionable-data-from-the-devsecops-pipeline/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-05-01T00:00:00-04:00</published><updated>2023-05-01T00:00:00-04:00</updated><author><name>Bill Nichols, Julie Cohen</name></author><id>https://www.sei.cmu.edu/blog/actionable-data-from-the-devsecops-pipeline/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In this blog post, we explore decisions that program managers make and information they need to confidently make decisions with data from DevSecOps pipelines.</summary><category term="Agile Adoption in Government"/><category term="Continuous Deployment of Capability"/><category term="Measurement and Analysis"/><category term="Agile"/></entry><entry><title>Writing Ansible Roles with Confidence</title><link href="https://www.sei.cmu.edu/blog/writing-ansible-roles-with-confidence/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-11-07T00:00:00-05:00</published><updated>2022-11-07T00:00:00-05:00</updated><author><name>Matthew Heckathorn</name></author><id>https://www.sei.cmu.edu/blog/writing-ansible-roles-with-confidence/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">How do you write Ansible roles in a way where you can be confident your role works as intended? This post provides guidance on how to best begin developing Ansible roles.</summary></entry><entry><title>A Technical DevSecOps Adoption Framework</title><link href="https://www.sei.cmu.edu/blog/a-technical-devsecops-adoption-framework/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-10-24T00:00:00-04:00</published><updated>2022-10-24T00:00:00-04:00</updated><author><name>Vanessa Jackson, Lyndsi Hughes</name></author><id>https://www.sei.cmu.edu/blog/a-technical-devsecops-adoption-framework/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post describes our new DevSecOps adoption framework that guides the planning and implementation of a roadmap to functional CI/CD pipeline capabilities.</summary><category term="Agile"/><category term="Devops"/><category term="Continuous Deployment of Capability"/></entry><entry><title>Combining Security and Velocity in a Continuous-Integration Pipeline for Large Teams</title><link href="https://www.sei.cmu.edu/blog/combining-security-and-velocity-in-a-continuous-integration-pipeline-for-large-teams/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-07-11T00:00:00-04:00</published><updated>2022-07-11T00:00:00-04:00</updated><author><name>Alejandro Gomez</name></author><id>https://www.sei.cmu.edu/blog/combining-security-and-velocity-in-a-continuous-integration-pipeline-for-large-teams/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post explores how one team managed—and eventually resolved—the two competing forces of developer velocity and cybersecurity enforcement by implementing DevSecOps practices.</summary></entry><entry><title>Modeling DevSecOps to Protect the Pipeline</title><link href="https://www.sei.cmu.edu/blog/modeling-devsecops-to-protect-the-pipeline/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-06-13T00:00:00-04:00</published><updated>2022-06-13T00:00:00-04:00</updated><author><name>Timothy A. Chick, Joseph Yankel</name></author><id>https://www.sei.cmu.edu/blog/modeling-devsecops-to-protect-the-pipeline/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post presents a DevSecOps Platform-Independent Model that uses model based system engineering constructs to formalize the practices of DevSecOps pipelines and organize guidance.</summary></entry><entry><title>From Model-Based Systems and Software Engineering to ModDevOps</title><link href="https://www.sei.cmu.edu/blog/from-model-based-systems-and-software-engineering-to-moddevops/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-11-22T00:00:00-05:00</published><updated>2021-11-22T00:00:00-05:00</updated><author><name>Jerome Hugues, Joseph Yankel</name></author><id>https://www.sei.cmu.edu/blog/from-model-based-systems-and-software-engineering-to-moddevops/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Introduction to ModDevOps, an extension of DevSecOps that embraces model-based systems engineering (MBSE) technology</summary><category term="Devops"/><category term="Architecture Analysis and Design Language (AADL)"/><category term="Model-Based Systems Engineering"/><category term="Systems Engineering"/><category term="Digital Engineering"/></entry><entry><title>The Role of DevSecOps in Continuous Authority to Operate</title><link href="https://www.sei.cmu.edu/blog/the-role-of-devsecops-in-continuous-authority-to-operate/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-10-04T00:00:00-04:00</published><updated>2021-10-04T00:00:00-04:00</updated><author><name>Tom Scanlon</name></author><id>https://www.sei.cmu.edu/blog/the-role-of-devsecops-in-continuous-authority-to-operate/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">DevSecOps favors rapid development and deployment. Such rapid development and deployment must be balanced against the need to ensure software systems are secure with minimal risk, thus enabling them to receive timely ATOs and continuous ATOs.</summary></entry><entry><title>Taking DevSecOps to the Next Level with Value Stream Mapping</title><link href="https://www.sei.cmu.edu/blog/taking-devsecops-to-the-next-level-with-value-stream-mapping/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-05-24T00:00:00-04:00</published><updated>2021-05-24T00:00:00-04:00</updated><author><name>Nanette Brown</name></author><id>https://www.sei.cmu.edu/blog/taking-devsecops-to-the-next-level-with-value-stream-mapping/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post explores the relationship between DevSecOps and value stream mapping, both of which are rooted in the Lean approach to systems and workflow. It also provides guidance on preparing to conduct value stream mapping within a software-intensive product development environment.</summary></entry><entry><title>Aligning DevSecOps and Machine Learning</title><link href="https://www.sei.cmu.edu/blog/aligning-devsecops-and-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-05-03T00:00:00-04:00</published><updated>2021-05-03T00:00:00-04:00</updated><author><name>Luiz Antunes</name></author><id>https://www.sei.cmu.edu/blog/aligning-devsecops-and-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Luiz Antunes explores the machine learning (ML) and DevSecOps domains and proposes ways to use them in collaboration for increased performance.</summary><category term="Machine Learning"/></entry><entry><title>The Current State of DevSecOps Metrics</title><link href="https://www.sei.cmu.edu/blog/the-current-state-of-devsecops-metrics/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-03-29T00:00:00-04:00</published><updated>2021-03-29T00:00:00-04:00</updated><author><name>Bill Nichols</name></author><id>https://www.sei.cmu.edu/blog/the-current-state-of-devsecops-metrics/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">DevSecOps practices yield useful, valuable information about software performance that is likely to lead to innovations in software engineering metrics.</summary><category term="Measurement and Analysis"/></entry></feed>