Shostack + Friends Blog

 

DevSecOps: What Every Security Engineer Should Learn from Star Trek

Kymberlee Price, Shostack + Associates

Security engineers in a DevSecOps world can learn a few things from Star Trek. Security engineers on the deck of a Star Trek ship examining data on screens.

Every Great Story Has Something to Teach Us

Star Wars isn’t the only beloved nerd franchise with relevance to modern software development. Security engineers in a DevSecOps world, embedded with application teams, sitting in sprint planning, reviewing pull requests, and trying to help developers understand why that API endpoint needs authentication before it ships to production can learn from Star Trek, too. Specifically, we need The Next Generation.

The Enterprise Is Your Application Portfolio

In Star Trek: The Next Generation, the USS Enterprise, NCC1701-D, is a ship of exploration, diplomacy, and science. It carries families. It has a bar. It’s defensive, not offensive; its primary mission is to build, not destroy.

This maps remarkably well to the modern enterprise application environment. Your job as a security engineer embedded in DevSecOps is to keep a complex, living, multi-crew vessel running safely through unpredictable space, while the actual mission of shipping software and serving customers continues without interruption.

The security engineer who shows up to every sprint review with a phaser set to "block the release" for the most minor issue will find themselves very quickly uninvited from the bridge. The security engineer who consistently helps the crew navigate safely to their destination?

That person gets a chair up front.

The Mission Profile Shapes the Defense

The Enterprise's defensive posture follows directly from its mission. It isn't configured like a warship because it isn't a warship. Its shields, its weapons loadout, its rules of engagement — all of it is calibrated to what the ship is actually doing and who it is likely to encounter while doing it.

What you're defending should follow from what you're building and who your threats are. This is a core principle of threat modeling. A research vessel has a different threat model than a Klingon Bird-of-Prey. A consumer payments application has a different threat model than an internal HR tool. The defensive investment should match the mission, the adversary, and the blast radius of a failure — not just a compliance checklist on the wall.

The Ship's Systems as Layered Defenses

The Enterprise doesn't rely on a single defensive system. System diagnostics run continuously to identify offline or degrading life-support and propulsion systems. Sensors detect threats before they're visible. Shields absorb incoming fire. The hull provides structural integrity. Weapons give the crew response options when diplomacy and deterrence fails. Each system has different properties, different failure modes, and a different role in the overall defensive posture — and critically, they work together. Shields don't make sensors redundant. Weapons don't replace hull integrity.

This is layered defense in practice. No single control is sufficient, and the goal isn't to maximize any one layer — it's to understand how the layers interact, where the gaps are, and what happens when one fails. A breach that gets through the shields shouldn't be able to reach the warp core. In application security terms: a vulnerability that bypasses your perimeter controls shouldn't have a direct path to your most sensitive data.

The Enterprise's crew knows which systems to prioritize under which conditions. They don't raise shields and fire torpedoes simultaneously at every sensor contact. They read the situation, apply the appropriate response, and preserve the systems they'll need for the next engagement. That kind of calibrated, layered thinking is what separates security architecture from security theater.

The Enterprise works because the mission is clear, the defenses are modeled and layered, and every system knows its role. But a well-designed ship still needs a crew that knows how to fly it. On First Contact Day, we'll meet the people on the bridge: what Picard, Worf, Troi, and Data can teach security engineers about diplomacy, risk communication, empathy, and the quiet power of consistency. Same ship. Different lens.

Further reading: Adam Shostack, Threats: What Every Engineer Should Learn From Star Wars (Wiley, 2023). For threat modeling methodology, see also Adam’s earlier work, Threat Modeling: Designing for Security.

Image by Canva AI Image Generator: "Security engineers helping software developers with security but make it Star Trek: The Next Generation and include hacker hoodies"