Phoenix Security Launches PYRUS: YAML-Native Engine Reinventing ASPM Application Security Vulnerability Management 

Washington, DC — November 6, 2025Phoenix Security expands its ASPM application security platform with PYRUS, a YAML-native engine that connects ownership, context, and configuration across code, cloud, and runtime. The launch strengthens the company’s position in vulnerability management and DevSecOps automation, unifying attribution and remediation at enterprise scale.

PYRUS in one line

A YAML-native engine that reads metadata from your repos, clouds, identity, and portals; auto-groups assets by service and owner; and feeds Phoenix Security’s ASPM to route the right vulnerability to the right team — with self-healing configuration when people, code, or environments change.

Why this matters for vulnerability management

Ownership is the throttle for remediation velocity. Scanners can enumerate thousands of issues, yet fixes stalls when teams can’t tell who operates an application, who deploys the container, or which business unit carries the risk. PYRUS encodes that truth where engineers already work — YAML and pipelines — and uses it to form living service definitions: applications, environments, tiers, and maintainers. Security inherits a real-time view of who does what, where; business leaders gain traceability and SLA alignment; and remediation lands with accountable owners on day one. When a service moves, a team rotates, or a tag changes, PYRUS updates ownership everywhere and Phoenix re-routes findings automatically. The outcome is simple: fewer handoffs, less triage, measurable risk reduction.

YAML-based CMDB: how it works

  • Declarative ownership. Repos hold catalog-info.yaml/service files that define services, teams, contacts, tiers, and environments.
  • Metadata correlation. PYRUS ingests code owners, repo/org metadata, commit activity, AWS/Azure/GCP tags, Kubernetes labels, CI/CD build IDs, identity groups, and enterprise CMDB references.
  • Automated grouping. Assets are grouped into services and applications using rules the engineering org controls.
  • Attribution & routing. Phoenix maps code, container, and cloud findings to the declared owners, creates tickets/PRs, and tracks closure against SLAs.
  • Self-healing. Drift in ownership or environment is detected and corrected through continuous sync, powering automated configuration across Phoenix.

Illustrative YAML

Built for developer reality, not legacy forms

Static CMDB forms and out-of-band spreadsheets drain velocity and fade the moment deployments change. PYRUS meets engineers in PRs and pipelines, not ticket queues. Ownership lives next to the code, and Phoenix reflects that truth back into enterprise systems without manual reconciliation.

Integrations & extensibility

  • ServiceNow CMDB — bi-directional enrichment to keep records accurate.
  • Backstage — maintainers and system catalog as first-class ownership.
  • Okta / Identity — team and role mappings for accountable access.
  • GitHub / GitLab / Bitbucket — CODEOWNERS, org metadata, and PR workflows.
  • Cloud & IaC — tags/labels from AWS, Azure, GCP, and Kubernetes; Terraform references.
  • Open rules & APIs — pluggable translators for internal portals and registries.

Drives Phoenix self-healing and automated configuration

PYRUS is the control plane for Phoenix Security’s self-healing posture: ownership updates propagate through the platform, deduplication and reachability suppress non-actionable findings, container lineage prevents work on images that never ship, and Remediator can open or even propose autofix PRs when policy allows — all tied to the correct owner.

Case-study proof

  • ClearBank (Fintech) — Cut container vulnerabilities by 98% (from ~467K to ~8K), reduced contextual duplicates by 90%+, and dropped criticals from 1,470 to 48. Automated team inheritance and code-to-cloud traceability enabled a small security team to support the development community, with multi-million-dollar time savings.
  • Bazaarvoice (Retail) — Achieved zero criticals in two weeks and a 40% reduction in high-risk issues by aligning ownership via YAML and developer systems, tightening container security around the teams that ship the code.
  • Ad-Tech Enterprise — Removed 78% of active container vulnerabilities and 82% of SCA noise by bridging code and cloud ownership using identity, CI/CD metadata, and container lineage.

Every result shares one principle: automated attribution turns visibility into execution.

Success criteria Phoenix will track with PYRUS

  1. Ownership coverage — % of assets/services with YAML ownership and synced enterprise records.
  2. Attribution accuracy — % of findings routed to the right team without reassignment.
  3. Noise reduction — % decrease via contextual deduplication, reachability, and container version control.
  4. MTTR — median days to fix for prioritized classes (code, container, cloud).
  5. Risk delta — quarterly reduction in critical/high risk on business-critical services.
  6. Workflow adoption — share of PR-based fixes and campaign closures vs. manual tickets.

Executive commentary

“Developers already declare the universe in YAML; PYRUS promotes that truth to the CMDB and keeps it alive,” said Francesco Cipollone, CEO & Co-Founder, Phoenix Security. “When ownership is encoded where work happens, attribution sticks, noise collapses, and teams ship fixes faster — that’s the promise of PYRUS.”

Availability

PYRUS is available today as part of Phoenix Security’s ASPM platform, and the Schema definition is open source available at the following link. Existing customers can enable PYRUS through configuration; new customers can include PYRUS in onboarding alongside integrations for ServiceNow, Backstage, Okta, GitHub, and major clouds.

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

A newly disclosed vulnerability in Microsoft ASP.NET Core’s Kestrel web server (CVE-2025-55315) allows HTTP Request Smuggling attacks that can bypass authentication, inject hidden requests, and compromise session integrity. Rated CVSS 9.9, this issue impacts all supported versions of .NET and Visual Studio 2022. External-facing or proxy-misconfigured applications are at highest risk. Immediate patching is strongly advised.
Francesco Cipollone
Phoenix Security has completed its SOC 2 Type 2 report, reinforcing our ISO 27001 and data privacy commitments. Our Actionable ASPM helps teams cut noise and ship fixes that matter, powered by reachability analysis, contextual deduplication, and human-aligned AI agents. Customers like ClearBank, Bazaarvoice, and Integral Ad Science report double-digit reductions in criticals and massive time savings. If you need verifiable trust and faster remediation across code-to-cloud, Phoenix Security turns risk data into a single, prioritized backlog that engineering actually executes.
Francesco Cipollone
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO