DevOps requires a new approach to security that calls for a renewed commitment by all team members to place protection of data and apps as a core element to their contributions to the overall project.
The most significant change that DevOps brings to the security equation is where and how it is implemented in the development/operations workflow. In a shift-left approach, security is implemented as a core requirement early in the process.
No matter which DevOps approach suits your goals, it must be remembered that while your provider answers to you when it comes to meeting performance expectations, you answer to your users.
DevOps teams will need to incorporate two practices that aim to gauge performance across distributed architectures: synthetic monitoring and real user monitoring (RUM). The difference lies in the approach used to gather data.
Monitoring is proving to be a significant challenge in the emerging DevOps era, not only because development and IT operations use different tools to peer into their respective environments, but in many cases have completely different ideas of what success means.