Where are you using WebAssembly?
Wasm promises to let developers build once and run anywhere. Are you using it yet?
At work, for production apps
At work, but not for production apps
I don’t use WebAssembly but expect to when the technology matures
I have no plans to use WebAssembly
No plans and I get mad whenever I see the buzzword
Cloud Native Ecosystem / Security

4 Reasons to Shift Left and Add Security Earlier in the SDLC

With the right cloud technology in place, development teams can securely build and test code for applications with the DevOps and security operations teams, and ultimately achieve faster runtimes with fewer security issues.
May 25th, 2022 6:50am by
Featued image for: 4 Reasons to Shift Left and Add Security Earlier in the SDLC
Featured image via Pixabay.

Keith Mokris
Keith Mokris, VP of product marketing at Orca Security, is a cloud security expert with expertise in secure software development. Keith focuses on cloud security for cloud native and multicloud environments through integration of CNAPP technology.

Agility and flexibility are the hallmarks of a modern, cloud native tech stack that can handle complex digital transformation initiatives, from built to production.

As market forces reveal profitable opportunities in a post-pandemic society, improving the software development life cycle (SDLC) has become a focal point that companies are looking at closely, specifically to manage security risks in the CI/CD pipeline and post-production phases of the SDLC.

With the right cloud technology in place, organizations can enable their development teams to securely build and test code for applications with the DevOps and security operations teams and ultimately achieve faster runtimes with fewer security issues over time in production.

Secure Applications and Code as a Marketplace Differentiator

In 2020, 90% of reported breaches involved web applications as the top hacking vector. Consumers are getting caught in the crosshairs as their personally identifiable information (PII) is exposed in high-profile breaches and sold on the dark web. Shipping secure code faster to production means more revenue, less downtime and less chance of a security breach. User privacy and security are important to consumers, and businesses can market accordingly.

Threat actors adapting tactics, techniques and procedures to reach their objectives are moving at faster attack rates than ever, making it inadvisable to develop software without DevSecOps technology and DevOps processes and team in place. A strong DevOps foundation requires an investment in the team members, tools and organizational structure needed to see results in key performance indicators over time.

Shifting Security Left in the CI/CD Pipeline

The CI/CD pipeline is a sequence of steps that any developer has to go through to deliver an efficient end product. Failure at any step triggers notifications to the responsible developers.

These are the three basic stages in the CI/CD pipeline:

Build Stage

This is the stage at which the code is taken from the source stage and is combined with its dependencies. It is then compiled to deploy the final application on the production server. Container images and IaC templates are scanned on the developer desktop or as part of regular, CI/CD workflows. Automated tests are executed to validate the code’s authenticity and the quality of the final product before it is deployed on the production server.

Deploy Stage

Registries are continually monitored to ensure application images are secure before deployment, with guardrail policies in place to prevent insecure deployments. Once the source code has passed all the tests and no flaws or bugs are seen, it is then deployed in various environments, like staging and production.

Run Stage

Production environments are monitored for risks with contextual alerts and risk prioritization, as well as integrations with ticketing and notification tools. The CI/CD pipeline imposes strict regulations to protect PII. PII security compliance is a requirement and a priority.

The implementation of CI/CD in the DevOps pipeline enables developers to easily identify the defects and other software/application quality issues that need to be resolved without breaking the code. When shift-left security is added to the next layer in the software development life cycle, the CI/CD pipeline can be strengthened even further. Shift-left security applies DevSecOps principles and tooling automation as a dynamic integration to enforce security in the built-test-run life cycle.

Organizations can gain four distinct advantages when shift-left capabilities are integrated into the CI/CD pipeline:

  • Increase the security posture of applications

The right cloud platform can scan container images, and in IaC templates, help identify vulnerabilities or misconfigurations across the entire development lifecycle. Look for cloud security capabilities that provide shift-left scanning results with insights into the production environment for the security operations team, which can work with DevOps and development teams quickly if potential attack paths are combined with existing risks.

  • Prevent of security risks early in the SDLC

By detecting issues early on, code issues are easier and less costly to fix. When code is in production and critical issues arise, the costs to fix not only impacts teams, it also impacts revenue.

  • Deploy applications to production faster

When security is integrated early and often into the CI/CD pipeline, organizations can identify flaws early, rather than in production. This prevents security from being “bolted on” at the end of the development process, when applications can be delayed if major security flaws are found that cannot be easily fixed.

  • Improve security outcomes by reducing workflow friction

Unplanned work negatively impacts the security team and can lead to alert fatigue. By integrating security into the CI/CD process and empowering developers and DevOps to own the scanning process themselves while using the same platform as the security team, teams improve collaboration, avoid friction and manage security risks proactively from development through runtime.

Shifting Security Left Unifies Development, DevOps and the SOC

Collaboration is critical for the security and development teams, especially when timelines have to change. The security operations center (SOC) team may need to train on cloud technologies and capabilities, while the cloud team may need help understanding how the organization performs risk management.

Understanding the roles and responsibilities of these teams and the security functions each fulfill is critical to managing security risks. In some scenarios, security teams can act as enablers for cloud engineering, teaching teams how to be self-sufficient in performing threat-modeling exercises. In other situations, security teams can act as escalation paths during security incidents. Last, security teams can also own and operate underlying platforms or libraries that provide contextual value to more stream-oriented cloud engineering teams, such as IAC scanning capabilities, shared libraries for authentication and monitoring, and support of workloads constructs, such as secure service meshes.

When looking at the technology opportunities, security leaders have more options than ever to choose the right investments to advance cloud security with purpose-built SDLC capabilities that provide visibility and context from development to runtime. These options can bring cross-functional teams together to unify workstreams, manage security risks and grow ROI.

Group Created with Sketch.
TNS owner Insight Partners is an investor in: Pragma.
THE NEW STACK UPDATE A newsletter digest of the week’s most important stories & analyses.