This skill should be used when the user asks to "design the CI/CD pipeline", "integrate security into delivery", "set up SBOM and artifact signing", "automate compliance", "measure DORA metrics", or mentions SAST, SCA, DAST, secrets scanning, IaC scanning, canary deployment, or policy-as-code. It produces DevSecOps pipeline architecture covering CI/CD design, shift-left security, supply chain integrity, release management, and compliance automation. Use this skill whenever the conversation involves build pipelines, deployment security, or delivery automation, even if they don't explicitly ask for "devsecops architecture". [EXPLICIT]
From jm-adknpx claudepluginhub javimontano/jm-adk-alfaThis skill is limited to using the following tools:
agents/guardian.mdagents/lead.mdagents/specialist.mdagents/support.mdevals/evals.jsonknowledge/body-of-knowledge.mdknowledge/knowledge-graph.mdprompts/meta.mdprompts/primary.mdprompts/variations/deep.mdprompts/variations/quick.mdreferences/devsecops-patterns.mdtemplates/output.docx.mdtemplates/output.htmlSearches, retrieves, and installs Agent Skills from prompts.chat registry using MCP tools like search_skills and get_skill. Activates for finding skills, browsing catalogs, or extending Claude.
DevSecOps architecture designs how software is built, tested, secured, and released to production. It integrates security into every stage of the delivery pipeline, ensuring code quality, compliance, and supply chain integrity. [EXPLICIT]
La seguridad que se agrega al final es la seguridad que se olvida. DevSecOps integra seguridad en cada etapa del pipeline: desde el commit hasta producción. SAST antes de merge, SCA en cada build, DAST en staging, y runtime protection en producción. El pipeline es la última línea de defensa antes del cliente.
The user provides a system or pipeline name as $ARGUMENTS. Parse $1 as the system/pipeline name used throughout all output artifacts. [EXPLICIT]
Parameters:
{MODO}: piloto-auto (default) | desatendido | supervisado | paso-a-paso
{FORMATO}: markdown (default) | html | dual{VARIANTE}: ejecutiva (~40% — S1 CI/CD pipeline + S2 shift-left security + S5 DORA metrics) | técnica (full 7 sections, default)Before generating architecture, detect pipeline context:
!find . -name "*.yml" -path "*/.github/*" -o -name "Jenkinsfile" -o -name ".gitlab-ci.yml" -o -name "Dockerfile" | head -20
If reference materials exist, load them:
Read ${CLAUDE_SKILL_DIR}/references/security-gates.md
Read ${CLAUDE_SKILL_DIR}/references/compliance-policies.md
Design of build, test, and deployment stages. [EXPLICIT]
Commit Stage (5-10 min): Git push -> compile -> unit tests -> lint -> build artifact -> publish to artifact repository
Acceptance Test Stage (10-30 min): Deploy to staging -> integration tests -> smoke tests -> contract tests -> performance baseline
UAT/Preview (optional): Production-like environment -> user acceptance -> business stakeholder validation
Production Stage: Deployment strategy (blue-green, canary, rolling) -> health checks -> automated rollback -> traffic shift
Post-Deployment: Smoke tests in production -> metrics monitoring -> incident response
Branching Strategy:
Artifact Management: Semantic versioning, immutable artifacts (once published never change), secured/replicated registries, retention policies
Environment Promotion: Same artifact through dev -> staging -> prod (no rebuild); env-specific config injected at deploy; secrets from vault; rollback: previous artifact always available
Security controls embedded throughout the pipeline. [EXPLICIT]
SAST (Static Analysis): Scans source code for vulnerabilities (SQLi, XSS, hard-coded creds). Tools: SonarQube, Semgrep, Checkmarx. Gate: block merge on critical/high.
SCA (Software Composition Analysis): Scans dependencies for CVEs, creates SBOM. Tools: Snyk, Dependabot, Trivy. Gate: flag high-severity, allow with justification.
Container Image Scanning: OS and app vulnerabilities in Docker images. Signed images for provenance. Tools: Trivy, Aqua, Clair. Base image policy: approved, minimal, regularly updated.
DAST (Dynamic Testing): Tests running application for web exploits, misconfigurations. Tools: OWASP ZAP, Burp Suite. When: staging (safe to break), limited to critical paths.
Secrets Scanning: Detect leaked credentials in code. Pre-commit hooks prevent secrets from committing. Post-commit audit. Tools: GitGuardian, TruffleHog, git-secrets. Gate: block + rotate exposed credentials.
License Compliance: Scan for license obligations (GPL requires source release). Tools: FOSSA, FOSSology. Gate: allow only approved licenses.
IaC Scanning: Check Terraform/CloudFormation for misconfigurations (public S3, missing encryption, permissive security groups). Tools: Checkov, TFLint. Gate: prevent non-compliant infrastructure deployment.
Ensures code and artifact integrity end-to-end. [EXPLICIT]
SBOM: Complete component list (SPDX/CycloneDX format), generated at build time, used for vulnerability tracking and compliance.
Artifact Signing: Sign with private key (cosign, Notary, sigstore), verify before deployment. Keys separate per environment.
Dependency Verification: Checksum verification, PGP signatures, provenance attestation, pinned versions (not latest).
Build Reproducibility: Same source + same environment = identical artifact. Detect tampering or build system compromise.
Build System Security: Immutable build agents (fresh per build), isolated build networks, signed commits, peer code review.
Strategy for version management and production deployment. [EXPLICIT]
Versioning: Semantic versioning (MAJOR.MINOR.PATCH), conventional commits, automated changelog generation.
Feature Flags: Enable/disable at runtime without redeploy. Gradual rollout (5% -> 25% -> 50% -> 100%). Kill switch for broken features. Tools: LaunchDarkly, Unleash.
Deployment Strategies:
Hotfixes: Code freeze before release; hotfix branch for emergency fixes applied to main and release branches with expedited testing.
Tracking and visibility into build/deployment process. [EXPLICIT]
DORA Metrics:
Pipeline Observability: Build duration, stage bottlenecks, success/failure rate, flaky test detection, artifact size trends
Deployment Tracking: Record each deployment (timestamp, version, who, environment), track frequency trends, rollback tracking
Production Health Post-Deployment: Error rate spikes, latency regression, resource utilization changes, business metric impact
Incident Correlation: Link deployments to incidents, identify problematic features, rollback timing measurement
Enforcement of compliance requirements through automated controls. [EXPLICIT]
Policy-as-Code: Define rules in code (YAML, Rego, Jinja). Enforce at build time, deploy time, runtime. Tools: OPA, Kyverno, HashiCorp Sentinel.
Example Policies:
Audit Trail: Every deployment logged (who, what, when, where). Immutable, cryptographically signed. Retention per compliance requirement (3-7 years).
Evidence Collection: Vulnerability scan results, test results/coverage, code review approvals, security gate pass/fail, deployment approvals.
Compliance Dashboard: Real-time status per application (red/yellow/green), drill-down to failing policies, trends over time.
Automated Remediation: Auto-patch security dependencies (if tests pass), auto-fix IaC violations, approval workflow before applying.
Security gates: non-negotiable vs. optional by risk classification. [EXPLICIT]
Commit Stage (Always Required): Code compiles, unit tests pass (>=80% coverage), linting passes, no secrets in code.
Build Stage (Always Required): SAST (no critical/high), SCA (dependencies scanned), container image scan (approved base, no high-severity), artifact signed.
Acceptance Stage (Always Required): Integration tests pass, contract tests pass, DAST on critical endpoints, performance baseline collected.
Production Stage (Risk-Dependent):
| Risk Level | Examples | Deployment | Approval | Gates |
|---|---|---|---|---|
| Low | Docs, UI changes, config | Continuous, any time | Automated or single engineer | Commit stage only |
| Medium | New features, perf improvements, patch deps | Business hours, monitoring required | Engineer + tech lead | Commit + build + acceptance |
| High | Auth changes, DB schema, infra, security fixes, breaking APIs | Canary only, gradual rollout | Security + architect + tech lead | All stages + security review + CAB |
Risk Mitigation: Canary with monitoring, instant rollback, runbook prepared, incident response on-call, blameless postmortem.
| Decision | Enables | Constrains | When to Use |
|---|---|---|---|
| Continuous Deployment | Rapid feedback, fast rollback, low batch size | High ops burden, strong automation required | Mature org, simple systems |
| Staged Releases (Canary) | Risk mitigation, early issue detection | Longer deployment, complex monitoring | Critical systems, large user base |
| Feature Flags | Decouple deploy from enablement | Code complexity, state management | Rapid iteration, experimentation |
| Blue-Green | Zero-downtime, instant rollback | 2x infrastructure cost | Mission-critical, hard-to-rollback |
| Automated Security Gates | Consistency, prevents manual bypasses | False positives, developer friction | Regulated systems, large teams |
| Lenient (Dev) vs. Strict (Prod) | Speed in dev, safety in prod | Inconsistency, late surprises | Different risk tolerance by environment |
| Compliance Automation | Evidence collection, audit efficiency | Initial setup complexity, ongoing policy maintenance | Regulated industries, large orgs |
Legacy System (No Pipeline): Manual deploys, no automated tests. Build pipeline incrementally: add tests first, then automation, then gates. [EXPLICIT]
High-Compliance System (Financial, Healthcare): Every change requires audit trail, approval, evidence. Security gates mandatory. Automate compliance evidence collection; gate all changes. [EXPLICIT]
Rapid Innovation (Startup): Speed over perfection; risk tolerance high. Minimal gates; automate only critical security. Continuous deployment, canary by default, rollback emphasis. [EXPLICIT]
Distributed Systems (Microservices): Hundreds of independent services; monolithic pipeline doesn't scale. Platform team provides shared pipeline template, service teams customize. [EXPLICIT]
Supply Chain Compromise Risk: Sophisticated attackers targeting build system. Signed artifacts, immutable build environment, provenance attestation. [EXPLICIT]
Before finalizing delivery, verify:
| Format | Default | Description |
|---|---|---|
markdown | Yes | Rich Markdown + Mermaid diagrams. Token-efficient. |
html | On demand | Branded HTML (Design System). Visual impact. |
dual | On demand | Both formats. |
Default output is Markdown with embedded Mermaid diagrams. HTML generation requires explicit {FORMATO}=html parameter. [EXPLICIT]
Primary: A-05_DevSecOps_Architecture_Deep.html — Executive summary, CI/CD pipeline, security controls, supply chain security, release management, pipeline observability, compliance automation, risk matrix.
Secondary: Pipeline stage diagram, security gate checklist, deployment playbook, DORA metrics dashboard, compliance evidence template.
Author: Javier Montano | Last updated: March 18, 2026