DevSecOps Foundations for Corporate Engineering Teams for the Healthcare & Pharmaceuticals Sector
Modern hospitals have internal SIMRS developer teams or work with SIMRS vendors, plus BPJS, insurance, and clinical analytics integration. Patient data is specific personal data under UU PDP. Hospital developer teams need DevSecOps discipline that protects patient data from design, with evidence attachable to KARS accreditation for information governance.
- format
- In-house / online / hybrid
- duration
- 4–5 intensive days or 2–3 month phased program
- participants
- 10–20 per cohort
- language
- Indonesian / English
Why DevSecOps Foundations for Corporate Engineering Teams is different in Healthcare & Pharmaceuticals
Modern hospitals have internal SIMRS developer teams or work with SIMRS vendors, plus BPJS, insurance, and clinical analytics integration. Patient data is specific personal data under UU PDP. Hospital developer teams need DevSecOps discipline that protects patient data from design, with evidence attachable to KARS accreditation for information governance.
- Hospital application coverage with SBOMNearly all production internal applications
- Critical SCA finding to production patch timeSignificant improvement after discipline matures
- DevSecOps governance evidence for KARSComplete at accreditation/reaccreditation
- UU PDP No. 27/2022 — health data = specific personal data
- UU No. 17/2023 Health Law
- KARS Hospital Accreditation Standards
- PMK on SIMRS and electronic medical records
- ISO/IEC 27001:2022 + ISO 27799
- NIST SP 800-218 SSDF
- Head of SIMRS / Hospital IT
- Lead Backend SIMRS
- Hospital DevOps / SRE
- Hospital Security Officer
- Vendor & Procurement Manager
- Director of Medical Support & IT
- Hospital developer teams master DevSecOps protecting patient data
- SIMRS applications produce SBOM and signed images
- SAST/SCA & secret scan active for internal SIMRS repositories
- Secure-development governance evidence for KARS accreditation
- Patient data breaches due to application defects decrease
Quick Answer
DevSecOps Foundations training is an in-house program equipping engineering, AppSec, and operations teams to integrate security into CI/CD — shift-left, SAST/DAST/SCA, SBOM, image signing, supply-chain — guided by NIST SP 800-218 SSDF, OWASP DevSecOps Maturity Model (DSOMM), and SLSA framework so releases stay fast and posture stays preserved.
Guided by industry-recognized DevSecOps frameworks
The material follows NIST SP 800-218 Secure Software Development Framework (2022), OWASP DevSecOps Maturity Model (DSOMM), SLSA framework levels 1–4, OWASP ASVS 4.0, and ISO/IEC 27001:2022 A.8.25–A.8.28 (secure development) — frameworks referenced by global auditors & regulators.
Log4Shell, SolarWinds, XZ lessons: supply-chain is real
Log4Shell (CVE-2021-44228) in December 2021 hit thousands of organizations because of widespread Java library use. SolarWinds (2020) compromised a trusted vendor's build pipeline. XZ Utils backdoor (CVE-2024-3094) showed long-term social engineering of maintainers. Without SBOM, image signing, and supply-chain discipline, organizations respond to these incidents in weeks instead of hours.
Healthy adoption pattern: paved-road + champion network
Successful DevSecOps adoption across many teams typically rests on a paved-road curated by AppSec/Platform (default SAST/SCA, default image signing) + AppSec champion network in every engineering team. Centralized AppSec shifts from bottleneck reviewer to enabler & escalation.
DevSecOps Foundations
DevSecOps is the practice of integrating security into the DevOps lifecycle from the earliest phase (shift-left) — covering threat modelling, SAST/DAST/SCA, secret scanning, container & IaC scanning, SBOM, image signing, and runtime security — mapped to NIST SP 800-218 Secure Software Development Framework (SSDF), OWASP DevSecOps Maturity Model (DSOMM), and SLSA framework levels 1–4, so teams release fast without sacrificing an auditable security posture.
Measurable Outcomes
Expected Outcomes
Indicators mapped to Kirkpatrick levels and OWASP DSOMM maturity — qualitative targets, set during TNA against your team baseline.
- DevSecOps discipline mastery (Kirkpatrick L2 — Learning)
- Most participants pass shift-left, basic threat modelling, and SAST/DAST/SCA/SBOM flow assessment
- Verified secure pipeline (L3 — Behavior)
- Team CI/CD integrates SAST + SCA + secret scanning, with break-build policy for high severity
- SBOM & supply-chain attestation
- Build produces SBOM (CycloneDX/SPDX) stored, images signed via cosign, and provenance attestation available
- OWASP DSOMM position
- Team maps starting position on DSOMM dimensions (Build & Deployment, Culture & Org, Implementation, Information Gathering, Test & Verification) and builds gap-closing roadmap
- NIST SSDF compliance
- Team development activities mapped to 4 SSDF groups (Prepare Organization, Protect Software, Produce Well-Secured Software, Respond to Vulnerabilities)
- Audit & incident readiness
- Security activity evidence documented for ISO 27001 audit, and supply-chain incident response playbook available
Program Format
Program Format Options
Chosen by team's DSOMM maturity position — finalized after TNA.
DevSecOps Foundations Bootcamp (4–5 days)
Intensive bootcamp: shift-left, threat modelling, SAST/DAST/SCA/secret scanning, container & IaC scanning, SBOM, image signing, runtime security. Hands-on in lab pipeline.
Supply-Chain Security Deep Dive
Deep workshop: SLSA framework levels 1–4, SBOM (CycloneDX/SPDX), in-toto attestation, cosign signing + verification policy, and lessons from SolarWinds/Log4Shell/XZ incidents.
Pipeline Hardening & Policy as Code Workshop
Consultative session applying SAST/SCA/DAST in real pipeline + policy as code (Open Policy Agent / Conftest) for break-build and promote control.
Recurring AppSec Champion & Maturity Program
Recurring program: AppSec champion network, tabletop sessions, finding reviews, and DSOMM reassessment for sustained maturity growth.
Free Consultation
Discuss your engineering team's DevSecOps plan
Start with a free training needs analysis: we map stack, roles, OWASP DSOMM maturity position, and your audit obligations, then build a proposal and budget based on real needs.
Curriculum
Curriculum Framework
Designed via ADDIE; final modules curated by stack & maturity position from TNA. Topics below represent full coverage.
Comparison
Choosing the Program Format
Concise decision matrix — final recommendation set after training needs analysis.
| Aspect | DevSecOps Foundations Bootcamp | Supply-Chain Security Deep Dive | Pipeline Hardening & Policy as Code | Recurring AppSec Champion & Maturity |
|---|---|---|---|---|
| Primary goal | Team shift-left foundation | SLSA + SBOM + signing readiness | Consistent pipeline integration | Sustained maturity uplift |
| Ideal participants | Teams starting DevSecOps | Teams facing supply-chain demands | Teams with CI/CD, lacking integration | Multi-team engineering & champions |
| Typical duration | 4–5 intensive days | 2–3 day workshop | 1–2 week consulting | Monthly / quarterly |
| Main output | Fundamentals mastery + labs | SBOM + signed image + playbook | Pipeline + policy as code | Champions + DSOMM up |
| Core framework | NIST SSDF + OWASP DSOMM basics | SLSA + SBOM CycloneDX/SPDX | OPA Gatekeeper + ISO 27001 A.8.x | DSOMM cycle + Kirkpatrick |
For Whom
Who This Program Is For
Designed by role because DevSecOps challenges differ for developer vs AppSec vs operations.
Software Developer / Engineer
Teams writing code, most effective at fixing vulnerabilities when they're still cheap.
Common challenges
- SAST/SCA findings pile up; no priority clarity; no shared severity language
- Secrets accidentally committed; secret scan only active after the incident
- Threat modelling not yet part of design; vulnerabilities found at audit / pen-test
Application Security (AppSec)
Teams supporting developers to maintain security posture.
Common challenges
- Hard to scale security reviews to dozens of teams; acts as bottleneck
- No AppSec champion network in developer teams yet
- No maturity baseline (DSOMM) reportable to leadership
DevOps / Build Engineer / SRE
Teams designing CI/CD pipelines and running runtime.
Common challenges
- CI/CD pipeline not yet integrated with SAST/SCA/DAST as standard
- SBOM not generated; images not signed; no supply-chain attestation
- Runtime security still reactive; no container anomaly detection
Security Engineer / Security Architect
Teams setting security policy and maintaining organization posture.
Common challenges
- Security control mapping to frameworks (NIST SSDF, ISO 27001:2022) not yet formal
- Major incident lessons (Log4Shell, SolarWinds, XZ) not translated to playbooks
- No policy as code automatically executed in pipeline
CTO / VP Engineering / Head of Eng
Owner of DevSecOps investment decisions and posture accountability.
Common challenges
- Maturity position unknown; security investment unfocused
- No security KPIs reportable to board / regulator
- ISO 27001 / POJK audits raise repeated findings
Industry Context
Industry Applications
One specific use case per industry, naming relevant workflows, regulations, and DevSecOps patterns.
DevSecOps pipeline for bank digital services (internet banking, mobile, API channels) with integrated SAST/SCA/DAST, SBOM per build, signed images, and security activity evidence usable for OJK examinations (POJK 11/POJK.03/2022, SEOJK 29/SEOJK.03/2022).
See in Banking & Financial Services context →DevSecOps platform for fast-growing technology companies — so all engineering teams deploy safely without making AppSec a bottleneck, with AppSec champion network and policy as code.
See in Technology & Startups context →Holding-level DevSecOps standard across BUMN subsidiaries with uniform security baseline, standard SBOM, and secure-development evidence usable for SPI/BPK and aligned with AKHLAK 'Amanah & Kompeten'.
See in State-Owned Enterprises (BUMN) context →Secure development of digital public service applications (SPBE) with SBOM, signing, and pipeline access controls accountable to BSSN, the Inspectorate, and the public, aligned with UU PDP.
See in Government & Public Sector context →Secure development of hospital applications (SIMRS, BPJS integration module, electronic medical record module) with pipeline controls that protect patient data (UU PDP specific data) and are KARS-ready.
DevSecOps for corporate applications & support systems in the energy sector (oil & gas, power) with OT/IT boundary controls — so application changes don't become an entry vector to critical operational systems.
See in Energy & Resources context →Delivery Method
Delivery
Format adapts to your engineering team distribution; all formats hands-on in lab pipeline.
On-site intensive & workshop
Facilitator comes to your office for a 4–5 day bootcamp; labs in practice repositories + integration to your internal pipeline (NDA applies).
Live online + managed labs
Interactive classes via Zoom/Teams; labs run on GitHub/GitLab sandbox + lab container registry provided by Neksus.
Hybrid
On-site for consultative modules (pipeline hardening, policy as code), online for concept & lab modules — suits multi-location teams.
Engagement Flow
Engagement Path
Follows ADDIE + NIST SSDF Prepare/Protect/Produce/Respond — qualitative durations, scaled to DSOMM position.
Training Needs Analysis & DSOMM Position
Mapping stack (GitHub/GitLab/Jenkins/Azure DevOps), roles, OWASP DSOMM position, existing SAST/SCA tooling, measurement baseline, and audit obligations.
Initial stageProgram Design by Role (ADDIE)
Drafting measurable learning objectives, role-based syllabi (developer/AppSec/DevOps/security), pipeline lab scenarios, and framework map to NIST SSDF + ISO 27001.
Pre-deliveryDevSecOps Foundations Bootcamp
Core 4–5 day session: shift-left, threat modelling, SAST/DAST/SCA/secret scan, container & IaC scanning, SBOM, image signing, runtime security. Hands-on in lab pipeline.
Core weekPipeline Hardening & Policy as Code
Consultative session applying SAST/SCA/DAST in team pipeline + policy as code (OPA/Conftest/Kyverno) for break-build and promote control.
Rolling per teamSupply-Chain & SBOM Roll-out
SLSA levels 2-3 workshop + per-build SBOM (CycloneDX/SPDX) + image signing with cosign + admission policy verifying signature.
Rolling per repositoryChampion, Tabletop & Recurring Evaluation
Active AppSec champion network, supply-chain incident tabletop, DSOMM reassessment, Kirkpatrick L1–L4 evaluation (Phillips L5 on request).
Recurring & continuousCase Studies
Typical Outcome Patterns
Illustrative patterns based on similar program structures — no named clients or promised numbers. NIST SSDF, OWASP DSOMM, SLSA, and SolarWinds/Log4Shell/XZ incidents are attributed as external sources (NIST, OWASP Foundation, Linux Foundation OpenSSF, MITRE CVE).
Financial institution with many digital channel repositories
Intervention
Bootcamp + pipeline hardening + SBOM + image signing + champion network
Result
Per-release secure-development evidence available; supply-chain traceable during major CVE incidents
Technology company with dozens of engineering teams
Intervention
OWASP DSOMM maturity assessment + paved-road pipeline + champion network
Result
DSOMM position rises consistently, centralized AppSec shifts to enabler role, releases don't slow
Government agency running SPBE
Intervention
Bootcamp + SBOM & secure SDLC workshop + BSSN/SPBE documentation
Result
Secure-development evidence available for SPBE Index; public service applications measurably hardened
Procurement Info
Information for Procurement & Vendor Management
What procurement, finance, legal, and information security teams need.
Indonesian PT under the Selestia ecosystem (Eduprima group); complete NPWP & legal documents; ready for PKS/contracts and vendor onboarding.
Structured proposal: measurable learning objectives, role-based syllabus, framework map (NIST SP 800-218 SSDF / OWASP DSOMM / SLSA / ISO 27001:2022 A.8.25-A.8.28 / POJK / UU PDP), facilitator profile, schedule, and TNA-based cost detail.
TNA-based — flat per program, per session, per participant, tiered, or custom. Estimate issued after TNA is agreed.
Flexible terms (DP + balance / per-batch installments); tax invoice (PPN) and PO documentation supported.
Familiar with BUMN/government procurement: vendor documentation, e-procurement / SPSE, HPS/offers, and compliance clauses.
Kirkpatrick L1–L3 evaluation reports (attendance, knowledge assessment, pipeline behavior) + OWASP DSOMM position map; Phillips ROI L5 on finance/risk request.
NDA signing, confidentiality of code & pipeline configurations used as case studies, and practices aligned with UU PDP and your internal security policy.
Pipeline references, policy-as-code templates, and documents built for your company are yours; usage rights of training materials are agreed in the contract.
FAQ
Frequently Asked Questions
Next Step
Discuss your engineering team's DevSecOps plan
Start with a free training needs analysis: we map stack, roles, OWASP DSOMM maturity position, and your audit obligations, then build a proposal and budget based on real needs.
- Training needs analysis at no cost — the natural first step
- Proposal, role-based syllabus, and framework map (NIST SSDF / OWASP DSOMM / SLSA / ISO 27001 / POJK) within a few business days
- Labs in lab pipeline; option to integrate to internal non-production pipeline
- Procurement-ready documents (company profile, NPWP, NDA, PPN tax invoice)
DevSecOps Foundations for Corporate Engineering Teams training for your Healthcare & Pharmaceuticals team
Start with a free training needs analysis: we map stack, roles, OWASP DSOMM maturity position, and your audit obligations, then build a proposal and budget based on real needs.
- Training needs analysis at no cost — the natural first step
- Proposal, role-based syllabus, and framework map (NIST SSDF / OWASP DSOMM / SLSA / ISO 27001 / POJK) within a few business days
- Labs in lab pipeline; option to integrate to internal non-production pipeline
- Procurement-ready documents (company profile, NPWP, NDA, PPN tax invoice)