CyberSecurity in a DevOps Environment: From Requirements to Monitoring