HomeCyber BalkansDeveloping for a Secure Future: Prioritizing Cybersecurity for Developers

Developing for a Secure Future: Prioritizing Cybersecurity for Developers

Published on

spot_img

The Rise of Developer Power: Understanding the Importance of Ecosystems and Platforms

An iconic moment in the rise of ecosystems was Steve Ballmer on stage saying ‘developers, developers, developers’ at the 1999 Microsoft .NET presentation. At the time, he was breaking new ground, repeating those words to help convince his teams on how crucial developers were going to be to the success of their platform. And then of course in 2008, Steve Jobs launched the iPhone and the App Store – a point in time that arguably changed the world and led to a massive rise of new developers. Both of those moments signaled the arrival of tech platforms, and solidified the important role a burgeoning developer industry would have in making them a success.

Today, it’s hard to imagine the world without developers, as they play a significant role in the platforms and ecosystems they operate in. While the focus may have been initially on enterprise B2B platforms with Microsoft, and then B2C with the Apple App Store, platforms have become much more ubiquitous and broad in their scope. Vertical platforms in industries such as hospitality, construction and ecommerce; horizontal platforms in areas such as financial services and CRM; and even platforms for platforms. These have become business operating systems of sorts for their customers. They create a massive amount of opportunity for developers, by reducing barriers to entry and providing access to large pools of customers.

In turn, developers enable these platforms to offer a broad array of complementary services, increase average revenue per user (ARPU) and drive more customer retention. The rise of digitalization Cloud platforms and ecosystems are part of an increasingly connected globe driven by the proliferation of technology. Many countries and governments are recognizing this and are accelerating the digitalization of their economies as quickly as possible. This shift means more opportunities for platforms and developers alike, especially as new markets open up.

However, it also means greater demands stemming from increased regulation, competition and cybersecurity risks. As part of this digitalization shift, more and more business and transaction data is moving online, exposing the data to a greater risk of cybersecurity-related issues – especially as malicious actors are getting more sophisticated and using AI. Smaller organizations are especially vulnerable and often don’t have the resources or expertise to invest in and maintain their own cybersecurity. Developers are recognizing this too: a recent survey published by small business cloud-accounting platform, Xero, shows more than half (56%) said data privacy and security are top of mind, and that 15% reported having faced cybersecurity challenges in the 12 months prior.

As cybersecurity incidents rise, it’s clear more developers are focused on data security and protecting customer data appropriately. Government and financial institutions are responding by introducing new regulatory and policy requirements that help protect consumers and businesses. Additionally, platforms themselves are also setting their own policies on key topics like responsible data use and API security standards. These policies set the expectation of how the platforms will operate internally and externally, and by extension any third-parties that they connect with – including developers.

For those looking to take advantage of the digitalization wave, navigating the additional cybersecurity, regulatory and platform requirements can be burdensome – especially for those looking to scale quickly. While cloud platforms are applying some of their own standards and policies, they also carry the distinct advantage of scale and resources. They can not only invest in security and keep up with regulatory changes, but can also provide additional paths to market and access to technology at a lower cost and with greater reliability. Developers seeking to build solutions that help businesses run their operations and handle their financial information can leverage the scalable and secure environments that platforms provide. Regulatory standards and cybersecurity features can be developed into apps and solutions from the ground up, providing assurance to end-users.

Building to enable building. For some smaller developers the combination of both internal and external standards can be an extra burden and a barrier to entry. Whether it be a platform policy decision to migrate an ecosystem from OAuth 1.0 to OAuth 2.0, or increasing regulatory requirements for multi-factor authentication (MFA), the increased compliance workload pulls valuable time away from building a product. Increasingly, platforms have recognized this burden and are investing in building out-of-the-box tools required to reduce the load. Underpinning this is extensive documentation, education and support for developers who need help or are interested in taking a deeper dive. An example is the large range of identity tools for user access and credentials that make signing-up and signing-into apps easier for customers, like Single-Sign On using Xero, Okta or Google. Developers can leverage existing customer details within the security of the platform as part of their onboarding and login flow.

Additionally, some platforms have already established complementary MFA tools as part of their login flow. This is especially useful for developers wanting to add additional security protocols for their product, or those operating or wanting to operate in countries like Australia where MFA is mandatory for digital service providers. Research from Verizon shows that MFA can prevent up to 80% of data breaches making it one of the most effective methods to protect customer data, especially if their credentials are compromised. Point-of-sale and payments platforms like Square, Stripe and Shopify all offer secure and easily integrated checkout and payments solutions so developers don’t need to build their own.

This helps avoid the increased compliance, risk and security burdens that come with directly managing payments – a highly regulated global industry. Platforms also constantly monitor the operation and security of their APIs with dedicated teams and tools. Issues or unusual behavior, such as  sudden spikes in request volumes or webhooks errors, can be immediately flagged for investigation, enabling the platforms to move quickly in response and notify developers.

Where there may be a product or feature slowness or outage, this also helps both parties manage the customer experience for end-users with status updates or a quick resolution. Reducing burden and barriers to entry for developers encourages innovation and experimentation in a platform. With developers being supported by cybersecurity features at the platform level, their time is freed up to focus on doing what they do best – solving problems and innovating. This ultimately benefits end-user customers who can use the platform and choose associated integrations with greater confidence.

Developers and end-users both benefit from the work that cloud platforms do in cybersecurity. By prioritizing identifying and working with platforms that provide a secure environment, developers are prioritizing the safety of the data of both parties. They’re also freeing up resources to spend on building out their products and solutions, enabling time to be spent on developing features that customers want. But even with platforms taking a lot of the security burden off of developers, it’s not permission to be idle when creating solutions. There are many other basic security practices and processes that should underpin the work developers and platforms do, to build additional layers of security when creating apps and integrations:

Encryption – employing encryption across systems and databases may sound obvious, but its additional base-level protection of data complements what platforms offer. AWS, Azure, or Google Cloud Platform provide in-built encryption tools and mechanisms that are often an easy way to apply encryption safely. However, applying encryption isn’t always a simple process. At Xero, we see developers constantly juggling all of the considerations including which algorithms to use and generating and securing unique keys.

Vulnerability management using industry accepted guidance for secure code development, such as OWASP Top 10, and ensuring secure communication between an app and authorization servers using HTTPS or similar secure protocol to prevent unauthorized access and eavesdropping.

Constant vigilance around security and encryption. The landscape is constantly changing, with new standards and tools available, to counter emerging threats. Integrating with platforms helps manage this, but it’s not a ‘one and done’ solution. Security monitoring practices, breach reporting provided by platforms helps to detect and manage threats before it’s too late.

Backing this up with appropriate audit logging at both application level and event-based actions can make it easy to identify and track unusual activity quickly. Data hosting and third-party risk assessments. We’ve seen multiple times over the past years, an increasing number of large and small-scale data breaches have shown the importance of not only hosting data in a secure manner, but also ensuring that all third-party solutions and apps that have access to the data are assessed and secured.

In conclusion, the rise of ecosystem platforms has revolutionized the tech industry. Both larger and smaller developers benefit from being part of a platform and reaping the rewards of a secure and reliable environment, innovating and adding value in a way that provides confidence to the end user. By embracing these opportunities, developers can continue to thrive in a marketplace rich with potential for growth and development. The ecosystem and platform landscape is constantly shifting, and as technology continues to evolve, it will be interesting to see what the emergence of new platforms means for the global digital economy.

Source link

Latest articles

Identifying online disinformation techniques

In today's world of information, knowledge is often just a few clicks away, thanks...

Secure Access in the Age of AI

Microsoft’s Principal Product Manager, Jef Kazimer, and Senior Product Manager, Bailey Bercik, were featured...

Vastaamo Hacker Vanishes During Ongoing Trial

The news article reports on the disappearance of Aleksanteri Kivimaki, a Finnish hacker who...

“Organizations are experiencing a significant identity crisis while criminals benefit” – The Register

Identity-related threats are becoming a growing concern for network security professionals due to the...

More like this

Identifying online disinformation techniques

In today's world of information, knowledge is often just a few clicks away, thanks...

Secure Access in the Age of AI

Microsoft’s Principal Product Manager, Jef Kazimer, and Senior Product Manager, Bailey Bercik, were featured...

Vastaamo Hacker Vanishes During Ongoing Trial

The news article reports on the disappearance of Aleksanteri Kivimaki, a Finnish hacker who...
en_USEnglish