Securing SDLC Practices for a Leading Health System
Feb 24, 2025
Challenge:
A leading health system required Static Code Scanning (SAST), Dynamic Application Scanning (DAST), and Software Bill of Materials (SBOM) tools to continuously scan application code and deployed systems for security vulnerabilities, ensuring compliance with NIST and HIPAA standards. Our client required seamless integration with their CICD platform, automating security gates within their CICD pipelines, and custom scanning solutions for MuleSoft to accelerate code deployment and security & compliance checks. Additionally, they sought ongoing maintenance, troubleshooting, and reporting to enhance security and mitigate vulnerabilities.
Our Approach:
We implemented a comprehensive DevSecOps framework for a leading Health System by deploying and automating SAST, DAST, and SBOM security tools like Checkmarx (SAST), Burp Suite (DAST), Feroot (client side protection), and Dependency-Track (SBOM).
To ensure continuous security enforcement, we:
- Integrated security scanning directly into the CI/CD pipeline with automated scan triggers.
- Configured security gates to block vulnerabilities before production deployments.
- Developed custom security solutions to scan applications like MuleSoft, expanding security coverage.
- Established security standards and processes to improve application security posture.
- Provided high-quality vulnerability reporting via Azure DevOps dashboards for proactive remediation.
- Developed and implemented a vulnerability remediation process. Streamlining vulnerability remediation efforts and enabling developers.
Outcomes:
- Introduction DevSecOps and shifting-left on security, reduced the cycle time for addressing potential vulnerabilities, by identifying those very early in the deployment lifecycle thus reducing the cost of operations.
- Continuous run of static and dynamic scans improved overall security posture of applications.
- Development and maintenance of bespoke solutions to scan applications like Mulesoft, brought all enterprise applications under same application security purview.
- Accelerated security benchmarking for future applications and overall confidence in deploying any changes to existing applications.
- Vulnerability remediation process, reduced security risks, minimizing exposure time and streamlining and integrating automated fixes into development pipelines. This allowed development teams to deliver secure software faster, with minimal disruption.