In today’s rapidly evolving digital landscape, organisations are under constant pressure to deliver software faster without compromising on quality or security. DevSecOps—represents a holistic approach to software delivery that emphasises security at every stage of the development lifecycle. To effectively measure and improve DevSecOps performance, many organisations have turned to DORA metrics, a set of key performance indicators established by Google’s DevOps Research and Assessment team.
We explore how DORA metrics can provide valuable insights for DevSecOps teams, helping teams to balance speed, quality, and security in software delivery processes. We’ll examine each metric in depth, discuss the security implications, and provide practical strategies for leveraging these metrics to enhance DevSecOps practices.
Understanding DORA Metrics
The DORA metrics were developed based on research conducted by the DevOps Research and Assessment team at Google Cloud. After studying thousands of teams across various industries, the researchers identified four key metrics that correlate strongly with software delivery performance and organisational success:
- Deployment Frequency (DF): How often a team successfully releases to production
- Lead Time for Changes (LT): The time it takes from code commit to code successfully running in production
- Mean Time to Recovery (MTTR): How long it takes to restore service when an incident or defect impacts users
- Change Failure Rate (CFR): The percentage of deployments causing a failure in production
These metrics fall into two categories: velocity metrics (DF and LT) that measure speed and throughput, and stability metrics (MTTR and CFR) that measure reliability and quality. High-performing teams excel in both categories, demonstrating that speed and stability are not mutually exclusive but complementary goals.
DORA Metrics and Their Security Implications
Deployment Frequency
Core Metric: How often code is deployed to production.
Security Implications: Frequent deployments can present both challenges and opportunities from a security perspective:
- Smaller change sets: More frequent deployments typically mean smaller batches of changes, which are easier to review for security issues. It also means the impacts tends to be minimal as well however this is not exclusive some small changes can have high impact.
- Increased attack surface changes: Each deployment potentially introduces new attack vectors that need to be secured.
- Security testing scalability: Traditional security testing approaches do not scale very well with high deployment frequencies.
DevSecOps Leverage Points:
- Automated security scanning: Implement automated security scanning tools integrated directly into CI/CD pipelines to ensure every deployment undergoes security analysis.
- Security as code: Define security requirements and controls as code, making them testable and deployable alongside application code.
- Progressive security validation: Implement progressive security testing where basic scans are performed frequently, while deeper security analyses occur on a scheduled basis.
Lead Time for Changes
Core Metric: The time between code commit and deployment to production.
Security Implications: Reducing lead time requires streamlining all aspects of the delivery pipeline, including security reviews:
- Security shifting left: Security must be integrated earlier in the development lifecycle to avoid becoming a bottleneck.
- Security debt: Fast lead times might tempt teams to defer security considerations, accumulating “security debt.”
- Feedback loops: Shorter lead times create tighter feedback loops, allowing security issues to be addressed more promptly.
DevSecOps Leverage Points:
- Pre-commit hooks: Implement security checks before code is committed to catch issues early.
- Developer security training: Train developers in secure coding practices to reduce security-related defects at the source.
- Parallel security processes: Structure security processes to run in parallel rather than sequentially, reducing their impact on lead times.
- Security champions: Embed security-focused team members within development teams to provide immediate guidance and reviews.
Mean Time to Recovery
Core Metric: How quickly service can be restored after an incident.
Security Implications: In the context of security, MTTR has special significance:
- Security incident response: Rapid recovery is critical during security incidents to minimize exposure and damage.
- Vulnerability patching: The ability to quickly deploy patches for known vulnerabilities reduces the window of exposure.
- Rollback capabilities: Strong rollback capabilities allow teams to quickly revert to a secure state if a security issue is discovered.
DevSecOps Leverage Points:
- Security incident playbooks: Develop and regularly practice response playbooks for common security incidents.
- Infrastructure as code: Use infrastructure as code to enable rapid, consistent recovery or rebuilding of environments.
- Immutable infrastructure: Implement immutable infrastructure practices where compromised systems are replaced rather than repaired.
- Feature flags: Implement feature flags to quickly disable vulnerable features without requiring a full deployment.
- Automated rollback: Create automated processes for rolling back deployments when security issues are detected.
Change Failure Rate
Core Metric: The percentage of changes that result in degraded service or require remediation.
Security Implications: From a security perspective, change failures include:
- Security vulnerabilities: Introduced vulnerabilities that require remediation.
- Compliance failures: Changes that violate compliance requirements.
- Configuration errors: Security misconfigurations that expose systems to risk.
DevSecOps Leverage Points:
- Security regression testing: Implement security regression tests to ensure that previously addressed vulnerabilities don’t reappear.
- Compliance as code: Codify compliance requirements into automated tests that run in the pipeline.
- Security chaos engineering: Proactively test systems for resilience against security failures.
- Post-deployment verification: Implement automated security verification after deployment to catch issues that slipped through pre-deployment tests.
Extending DORA Metrics for DevSecOps
While the standard DORA metrics provide valuable insights, DevSecOps teams may benefit from extending these metrics or adding security-specific measurements:
Security-Enhanced Deployment Frequency
Extended Metric: Frequency of deployments that have passed comprehensive security validation.
Implementation: Track not just deployment frequency, but specifically deployments that have successfully passed all security gates, including dynamic and static analysis, dependency scanning, and compliance checks.
Security Lead Time
Extended Metric: Time required to address and deploy fixes for identified security vulnerabilities based on severity.
Implementation: Measure the time from security vulnerability discovery to remediation in production, categorised by severity level (critical, high, medium, low).
Mean Time to Detect (MTTD)
Additional Metric: How quickly security incidents or vulnerabilities are detected after introduction.
Implementation: Track the time between when a vulnerability is introduced and when it’s discovered through security testing, monitoring, or reporting.
Security Debt Reduction Rate
Additional Metric: The rate at which known security issues are addressed and resolved.
Implementation: Measure the reduction in the backlog of known security vulnerabilities and technical debt with security implications.
Security Test Coverage
Additional Metric: The percentage of code covered by automated security tests.
Implementation: Track what proportion of the codebase and infrastructure is regularly analysed by security testing tools. And ensure you adequately understand what aspects the tool covers and most importantly what it doesn’t cover. There is also a number of tools which overlap so ensure you are not double counting results.
Establishing a DevSecOps Measurement Program
To effectively leverage DORA metrics in a DevSecOps context, organisations should establish a comprehensive measurement program:
1. Define Baseline and Targets
Start by establishing current performance levels for each metric and setting realistic improvement targets based on industry benchmarks and organisational goals. The DORA research categorises performance into elite, high, medium, and low performers, providing useful benchmarks:
Metric | Elite | High | Medium | Low |
Deployment Frequency | On-demand (multiple times per day) | Between once per day and once per week | Between once per week and once per month | Between once per month and once every six months |
Lead Time for Changes | Less than one hour | Between one day and one week | Between one week and one month | Between one month and six months |
Mean Time to Recover | Less than one hour | Less than one day | Between one day and one week | More than one week |
Change Failure Rate | 0-15% | 16-30% | 31-45% | 46-60% |
2. Implement Measurement Tools
Deploy tools to automatically collect and analyse DORA metrics and their security extensions. Many DevOps platforms and observability tools now include DORA metric tracking capabilities. These should be supplemented with security-specific measurements from application security testing tools, vulnerability scanners, and security information and event management (SIEM) systems.
3. Create Visibility and Accountability
Make metrics visible to all team members through dashboards and regular reporting. Establish clear ownership for each metric, ensuring that teams understand their role in improving performance. Create cross-functional accountability between development, security, and operations teams.
4. Analyse Trends and Correlations
Look beyond point-in-time measurements to analyse trends over time and correlations between metrics. For example, investigate whether increased deployment frequency correlates with changes in security vulnerabilities or time to recovery.
5. Continuous Improvement Cycles
Implement regular review cycles to analyse metrics, identify improvement opportunities, and adjust processes and practices accordingly. Use retrospectives and post-incident reviews to identify systemic issues affecting performance.
Practical Strategies for Improvement
Based on DORA metrics analysis, DevSecOps teams can implement targeted strategies to improve their performance:
Improving Velocity Metrics While Maintaining Security
- Automate security testing: Integrate security testing into CI/CD pipelines to maintain security standards while increasing velocity.
- Security requirements as code: Define security requirements as testable code that can be validated automatically.
- Shift security left: Move security activities earlier in the development process to prevent bottlenecks later.
- Standardise secure components: Create pre-approved, secure components and libraries to accelerate development without compromising security.
- Security design patterns: Establish reusable security design patterns that developers can implement consistently.
Improving Stability Metrics Through Security Practices
- Security monitoring and alerting: Implement comprehensive security monitoring to detect issues quickly.
- Automated remediation: Create automated remediation workflows for common security issues.
- Vulnerability management integration: Integrate vulnerability management with development workflows to prioritise and address security defects.
- Security chaos engineering: Proactively test system resilience against security incidents.
- Post-deployment security verification: Implement automated security checks after deployment to validate security controls.
Cultural and Organisational Improvements
- Blameless security culture: Foster a culture where security issues are treated as learning opportunities rather than blame occasions.
- Security champions program: Embed security expertise within development teams through designated security champions.
- Cross-functional teams: Create truly cross-functional teams that include security expertise alongside development and operations skills.
- Shared responsibility model: Establish that security is everyone’s responsibility, not just the security team’s.
- Continuous learning: Invest in ongoing security education for all team members.
Case Studies: DORA Metrics in DevSecOps Practice
Financial Services Company
A large financial institution struggled with balancing regulatory compliance requirements with the desire to increase deployment frequency. By implementing security as code and compliance as code practices, they were able to:
- Increase deployment frequency from monthly to weekly releases
- Reduce security-related change failures by 40%
- Automate 85% of compliance checks
- Decrease lead time for changes from weeks to days
Key to their success was the creation of a pre-approved security controls library that developers could incorporate into their code, along with automated compliance testing integrated into their CI/CD pipeline.
E-commerce Platform
An e-commerce company faced challenges with frequent security incidents following new deployments. By focusing on DORA metrics with security extensions, they:
- Reduced MTTR for security incidents from days to hours
- Decreased security-related change failure rate from 25% to 8%
- Implemented security verification gates that added minimal overhead to deployment frequency
- Improved mean time to detect from weeks to hours through enhanced monitoring
Their approach centered on implementing security chaos engineering practices, where they regularly simulated security failures to test detection and response capabilities.
Healthcare Technology Provider
A healthcare technology provider needed to balance rapid innovation with strict patient data protection requirements. Their DevSecOps transformation focused on:
- Maintaining deployment frequency while enhancing security validation
- Reducing security vulnerability remediation lead time by 60%
- Implementing comprehensive security test coverage that reached 92% of critical code paths
- Decreasing change failure rate due to security issues by 35%
They achieved these improvements by implementing a comprehensive code security training program for developers and creating a security scoring system that was visible alongside other DORA metrics.
Challenges and Pitfalls
While DORA metrics provide valuable insights for DevSecOps teams, there are several challenges and potential pitfalls to be aware of:
1. Metric Manipulation
Teams might focus on improving metrics at the expense of actual security, such as deploying more frequently but skipping thorough security validation. To avoid this, balance metric targets with quality gates and outcome-based measures.
2. Security as a Bottleneck
Poorly implemented security practices can become bottlenecks that degrade DORA metrics. Focus on security automation and integration rather than manual gates and approvals. Ensure that security activities are effective and not just security theatre.
3. Overlooking Contextual Factors
Different applications and systems have different risk profiles and requirements. Avoid applying the same DORA metric targets across all systems without considering context.
4. Missing Qualitative Aspects
DORA metrics are quantitative and may miss qualitative aspects of security, such as design flaws or architectural vulnerabilities. Supplement metrics with qualitative security assessments.
5. Tool Overemphasis
Over-reliance on tools without addressing cultural and process issues can lead to a false sense of security. Remember – tools support the process but don’t replace human judgment.
Future Direction: DORA and DevSecOps Evolution
As DevSecOps practices continue to evolve, we can expect several developments in how DORA metrics are applied in security contexts:
1. AI and Machine Learning Integration
AI and machine learning will increasingly be used to analyze DORA metrics alongside security data to predict potential security issues before they manifest, enabling proactive intervention.
2. Supply Chain Security Metrics
With the growing concern about supply chain attacks, DORA metrics may be extended to measure the security of the entire software supply chain, not just internal development processes.
3. Regulatory Alignment
As regulatory requirements for software security become more stringent, DORA metrics may evolve to align with compliance requirements, providing evidence of due diligence in security practices.
4. Security Value Stream Mapping
Organizations will increasingly map their entire security value stream and measure efficiency at each stage, extending DORA concepts to cover the complete security lifecycle.
5. Business Impact Correlation
Future metrics will likely focus more on correlating technical performance metrics with business outcomes, demonstrating the business value of secure DevOps practices.
Conclusion
DORA metrics provide a powerful framework for measuring and improving DevSecOps performance. By understanding the security implications of each metric and extending the framework with security-specific measurements, organizations can balance the sometimes competing demands of velocity, stability, and security.
The key insight from both DORA research and DevSecOps practice is that security does not have to come at the expense of speed. In fact, well-implemented security practices can enhance overall delivery performance by reducing rework, preventing incidents, and building customer trust.
As organisations continue to mature their DevSecOps practices, DORA metrics will play an increasingly important role in guiding improvement efforts and demonstrating the business value of secure delivery processes. By establishing baseline measurements, setting realistic targets, and implementing continuous improvement cycles, teams can progressively enhance both their delivery performance and their security posture.
In the end, the goal is not to achieve perfect scores on DORA metrics, but to use these measurements to drive better outcomes for the business and its customers. When security is seamlessly integrated into development and operations practices, organisations can deliver value quickly, reliably, and securely—the ultimate promise of DevSecOps.