Why do techies opt DevSecOps? To be precise for security. The main aim to adopt it is to bring a safe and secure software which is to be constructed, else the modern technology which is ruling the world will face consequences. Yes, the breach of security are the largest and widely spreading threats not only in the organisation but to face today’s government in spite of pandemic. Of course, it provides traditional securities for an active process of Software Development Life Cycle (SDLC). The InfoSec interferes and engages more often at the end of the development platform of SDLC.  How does it function?  It adopts the foster collaboration and helps to avoid delay in progress for developing a software. Before DecSecOps there might be a possibility to face a problem of insecurity at the enth minute will may impact several consequences, but after implementing it you don’t have any possibilities to have trouble at the end or last minute as this helps to monitor and advocate right from the beginning. However the probability will be very low apart from these precautions. The IT has faced huge changes in years, thus the dynamic data resources and cloud computing helps to drive the IT and it’s speed and cost benefits which helps to improve the application development. Yet many software securities provide the similar facility it doesn’t match from the integrated security and the continuous integration (CI) were built to test the code and speed provided by DevSecOps. An important part of this was it helps to facilitate at a rapid speed when compared to DevOps and also guides the clients to their almost personalised benefits.  Challenges faced Apart from being secured right from the start till the end of SDLC they also face few obstacles as they have defecting operating models and objectives, while it may rarely lack in governance proceedings and app or software developers responsibilities. Few also wrongly  assume as if you have implemented it once they assume it is done, but it is not true in the process of DevOps and it’s security. It changes depending upon the scenarios and circumstances. The business requirements, infrastructures and policies forever change according to their respective cases.