RACI Template (DevSecOps)

Replace placeholders like {{TEAM}}, {{OWNER}}, and tune responsibilities to match your org.

Scope & Assumptions

  • Pipeline contract: Makefile targets (make ci, make cd, gates, evidence ZIP).
  • Cluster: Minikube locally; same controls map to CI/staging/prod.
  • Evidence: all scanners and policies write to ./artifacts.

RACI (Responsible, Accountable, Consulted, Informed)

Legend: R = Responsible (does the work) · A = Accountable (owns the outcome) · C = Consulted · I = Informed

Dev Controls & Supply Chain

Control / ActivityDev ({{TEAM}})Security ({{TEAM}})Platform/Ops ({{TEAM}})Notes
Secrets scanning (TruffleHog) – fix verified hitsRAIPre-commit hooks optional; verified secrets block
SAST (Semgrep) – remediate curated High/CriticalRAICurated ruleset maintained by Security
Dockerfile lint (Hadolint)RAIStyle/safety; warn by default
IaC scan (Checkov) – high-risk failsRACSecurity defines “fail” checks; Ops consulted
SBOM generation (Syft)RAIRequired for releases
Image SCA (Trivy) – gate on severityRACGate policy set by Security
License policy – deny listRACLegal may be consulted
Golden base images – curate & pin digestsIAROps builds/maintains base images
Artifact signing (Cosign) – key mgmtIARKeys in KMS/HSM; rotation by Ops
Promotion on passRARImplemented in CI; Make parity

Kubernetes Admission & Runtime

Control / ActivityDevSecurityPlatform/OpsNotes
Kyverno policies – DENY (no privileged, drop caps, seccomp, runAsNonRoot, probes)IARSecurity authors; Ops applies & monitors
Kyverno verifyImages (Cosign pubkey)IARAdmission requires signatures for org images
Pod Security labels (restricted)IARNamespace labels owned by Ops
RBAC least privilege (SA/Role/Binding)RARDev proposes verbs; Security approves; Ops applies
NetworkPolicies (default deny + DNS egress + app ingress)CARDev supplies ports; Ops applies
Ingress/WAF demoCAROptional; aligns with app routes
Falco runtime signalsIARAlerts routed to SOC/Slack

Process & Governance

ProcessDevSecurityPlatform/OpsNotes
Triage & SLAsR (own code)A (policy & coaching)CCritical ≤7d, High ≤30d, Medium ≤90d
Exception register (time-boxed)RACExpiry + rationale required
Evidence ZIPsRACProduced per build; archived centrally
Metrics/KPIsCACHigh vulns in RC; SLA compliance; time-to-fix
Training (OWASP, secure coding)R (attend/apply)A (program)CMapped to real findings
Incident response (security defects)RACLinks to IR playbooks

Named Contacts (fill in)

  • Security lead (A): {{OWNER}} · Backup: {{OWNER}}
  • Platform/Ops lead (A/R): {{OWNER}} · Backup: {{OWNER}}
  • Service owner(s) (R): {{OWNER}}

Review Cadence

  • Weekly: 15-min findings triage (Dev + Security).
  • Monthly: Ratchet review (thresholds/gates).
  • Quarterly: Policy refresh (Kyverno, RBAC, NetPol).

Sign-off

  • Effective date: ________
  • Approved by (Security): ____________________
  • Approved by (Platform/Ops): ________________
  • Approved by (Engineering): ________________