This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Protect the Organization (PO)

Protect the Organization (PO) Post Deployment CI/CD Steps

Protect the Organization (PO)

Organizations should ensure that their people, processes, and technology are prepared to perform secure software development at the organization level. Many organizations will find some PO practices to also be applicable to subsets of their software development, like individual development groups or projects.


PO.1 Define Security Requirements for Software Development: Ensure that security requirements for software development are known at all times so that they can be taken into account throughout the SDLC and duplication of effort can be minimized because the requirements information can be collected once and shared. This includes requirements from internal sources (e.g., the organization’s policies, business objectives, and risk management strategy) and external sources (e.g., applicable laws and regulations).


To satisfy SSDF PO.1 in a post-deployment context using open-source tools, the focus shifts from just defining to:

  • Maintaining and enforcing PO tasks in live systems.

  • Making task requirements visible and traceable across deployed environments.

  • Auditing and updating methods and procedures as internal and external policies change.


Tasks Tools

P.O.1.1: Identify and document all security requirements for the organization’s software development infrastructures and processes, and maintain the requirements over time.


PO.1.2 Identify and document all security requirements for organization-developed software to meet, and maintain the requirements over time.

Open Policy Agent

Supports definitions of security policies as code and enforce them in pipelines, CI/CD, and runtime. Enforces runtime policies via integrations with Kubernetes, Terraform, and CI/CD platforms.

InspecLog

Periodically audits deployed environments against internal and external security standards.

Ortelius Evidence Store

Associate and version security requirement metadata per service and deployment, enabling continuous visibility.

DefectDojo

Maps security findings back to specific policy controls or regulatory frameworks.

PO.2 Implement Roles and Responsibilities: Ensure that everyone inside and outside of the organization involved in the SDLC is prepared to perform their SDLC-related roles and responsibilities throughout the SDLC.


To satisfy SSDF PO.2 in a post-deployment context using open-source tools, the focus shifts to:

  • Defining and assigning roles for who is responsible for remediation and runtime configurations.

  • Maintaining evidence of what was deployed, who deployed it, and impact across all software assets.

  • Ensuring security and patch management with restricted post-deployment actions.


Tasks Tools

PO.2.1: Create new roles and alter responsibilities for existing roles as needed to encompass all parts of the SDLC. Periodically review and maintain the defined roles and responsibilities, updating them as needed.


PO.2.2: Provide role-based training for all personnel with responsibilities that contribute to secure development. Periodically review personnel proficiency and role-based training, and update the training as needed.


PO.2.3: Obtain upper management or authorizing official commitment to secure development, and convey that commitment to all with development related roles and responsibilities.

Git

Tracks authorship and code reviewers, and tags releases and documents who triggered them.

Ortelius Evidence Store

Associates deployed services with responsible individuals or teams, with historical record of changes, deployments and roles.

Backstage

Lists service owners, on-call teams and escalation paths making post-deployment responsibility transparent across the organization.

DefectDojo

Track security findings and assign resolution responsibilities.

Kubernetes RBAC / OPA Gatekeepr

Enforces access policies and role boundaries in runtime environments.

ArgoCD

Ensures only authorized commits/deployments affect production and logs every promotion and rollback.

Falco

Detects unauthorized activity at runtime.

Prometheus + Alertmanager

Alerts based on ownership/roles

PO.3 Implement Supporting Toolchains: Use automation to reduce human effort and improve the accuracy, reproducibility, usability, and comprehensiveness of security practices throughout the SDLC, as well as provide a way to document and demonstrate the use of these practices. Toolchains and tools may be used at different levels of the organization, such as organization-wide or project-specific, and may address a particular part of the SDLC, like a build pipeline.


To satisfy SSDF PO.3 in a post-deployment context using open-source tools, the focus shifts to:

  • Ensuring toolchains support vulnerability detection, SBOM tracking, compliance, and policy enforcement to function after release.

  • Keeping automation tooling secure, updated, and integrated with the live environment.

  • Maintaining evidence that the toolchain’s outputs (e.g., SBOMs, scan reports) remain trustworthy and current.


Tasks Tools
PO.3.1: Specify which tools or tool types must or should be included in each toolchain to mitigate identified risks, as well as how the toolchain components are to be integrated with each other.


PO.3.2: Follow recommended security practices to deploy, operate, and maintain tools and toolchains.


PO.3.3: Configure tools to generate artifacts6 of their support of secure software development practices as defined by the organization.

OWASP Dependency Track

Continuously monitors SBOMs for newly disclosed CVEs in deployed software.

Ortelius Evidence Store

Maintains a historical record of deployed software, components, and their SBOMs; links to owners for accountability.

Syft

Generates SBOMs from deployed container images or filesystems on-demand.

Trivy

Post-deployment container, filesystem, and package vulnerability scanning; also generates SBOMs.

Clair

Continuous scanning of container registries for vulnerabilities.

Grype

Fast vulnerability scanner for container images and filesystems.

In-Toto

Validates that deployed artifacts match the cryptographic attestations from the build process.

Sigstore cosign

Verifies signatures of deployed artifacts; ensures they match approved builds.

Sigstore Rekor

Provides a public, immutable log for signatures and provenance data.

Open Policy Agent

Enforce security and compliance policies on deployed systems (e.g., Kubernetes clusters).

Inspec

Audit deployed infrastructure and applications against security baselines and compliance requirements.

The Hive

Incident response platform for post-deployment security events.

DefectDojo

Track vulnerabilities and assign remediation tasks; integrate with scanners for continuous updates.

PO.4 Define and Use Criteria for Software Security Checks: Help ensure that the software resulting from the SDLC meets the organization’s expectations by defining and using criteria for checking the software’s security during development.


To satisfy SSDF PO.4 in a post-deployment context using open-source tools, the focus shifts to:

  • Ensuring that security data continues to be collected after release.

  • Logs, SBOMs, and scan results are preserved and tamper-resistant.

  • Data is safeguarded to prevent unauthorized access or modification.

  • Data is retrievable for audits, investigations, and compliance checks


Tasks Tools
PO.4.1: Define criteria for software security checks and track throughout the SDLC.


PO.4.2: Implement processes, mechanisms, etc. to gather and safeguard the necessary information in support of the criteria.


Falco

Runtime security detection for containers and hosts; generates event logs for suspicious behavior.

AuditD

Captures system-level security events for Linux.

OSQuery

Endpoint telemetry and configuration monitoring.

Prometheus and Loki

Collect and store metrics and logs in a queryable format.

Ortelius Evidence Store

Maintains versioned SBOMs linked to each deployment.

Syft

Generates SBOMs from deployed artifacts for ongoing monitoring./p>

OpenSCAP

Collects and stores compliance scan data.

Wazuh SIEM

SIEM with audit logging, threat detection, and compliance monitoring.

Grype

Detects CVEs in deployed images and file systems.

In-Toto

Validates that deployed artifacts match the cryptographic attestations from the build process.

Sigstore Rekor

Provides a public, immutable log for signatures and provenance data.

Inspec

Audit deployed infrastructure and applications against security baselines and compliance requirements.

Trivy

Continuous vulnerability scanning + SBOM generation for running systems.

DefectDojo

Stores and organizes security scan results; integrates with Trivy, Grype, and Dependency-Track.

PO.5 Implement and Maintain Secure Environments for Software Development: Ensure that all components of the environments for software development are strongly protected from internal and external threats to prevent compromises of the environments or the software being developed or maintained within them. Examples of environments for software development include development, build, test, and distribution environments.


To satisfy SSDF PO.5 in a post-deployment context using open-source tools, the focus shifts to:

  • The security requirements for your development infrastructure are still relevant and enforced after software is released.

  • Your build, deployment, and monitoring environments remain hardened and compliant.

  • You continuously validate that your development infrastructure hasn’t drifted from its secure baseline.


Tasks Tools
PO.5.1: Separate and protect each environment involved in software development.


PO.5.2: Secure and harden development endpoints (i.e., endpoints for software designers, developers, testers, builders, etc.) to perform development-related tasks using a risk-based approach.


Inspec

Runs ongoing compliance scans against development and build servers; enforce CIS/NIST benchmarks.

OpenSCAP

Check infrastructure against defined security baselines.

OSQuery

Monitor build and deployment nodes for unauthorized changes.

Kube-bench

Validates Kubernetes-based build/test clusters meet CIS benchmarks.

Open Policy Agent - GateKeeper

Enforce rules for infrastructure configuration (Kubernetes, Terraform, CI/CD).

Kyverno

Kubernetes-native policy enforcement for cluster security./p>

Jenkins

Hardened CI/CD pipelines with access controls and audit logs.

Nexus Repository OSS

Securely store build artifacts post-deployment; apply access controls.

Harbor

Container registry with built-in vulnerability scanning and RBAC.

Wazuh SIEM

Ingests infrastructure security logs and alerts on violations.

Falco

Detect unauthorized activity in build/deployment clusters or runner nodes.

Prometheus + Alertmanager

Monitor infrastructure security metrics and trigger notifications.

In-Toto

Validates that deployed artifacts match the cryptographic attestations from the build process.

Sigstore Rekor

Maintain an immutable, tamper-evident log of signed infrastructure configuration files.