HomeCII/OTHow Can Your Security Team Support Developers in Shifting Left?

How Can Your Security Team Support Developers in Shifting Left?

Published on

spot_img

In a recent interview, Scott Gerlach, the CSO and co-founder of StackHawk, shared his insights on how organizations can successfully shift their security left without causing delays in their developers’ productivity. He emphasized that achieving this requires a combination of people, processes, and technology, with tooling alone being insufficient. Gerlach offered six recommended steps that organizations can take to embark on this journey and effectively shift security left while maintaining developer velocity.

The first step Gerlach suggests is to involve the development team early in the application security (AppSec) design process. By partnering with developers in decision-making, organizations can evaluate and onboard appropriate tooling, establish fix cycles, determine how findings will be assigned and tracked, and obtain buy-in from development leadership. This collaborative approach ensures that the AppSec process is designed in a way that minimizes interruptions for developers, allowing software to be delivered promptly.

The second step is to involve the security team early in the development process. Developers should communicate the goals, business significance, data handling requirements, and intended functionality of their applications to the security team at the start of the design phase. This enables the security team to assess risk tolerance accurately and provide guidance on implementing necessary security measures, such as authentication and encryption, before the coding begins.

The third step focuses on empowering developers to help themselves. Gerlach recommends adopting tooling that facilitates developers’ understanding of identified issues, their importance, and how to reproduce them for effective resolution. Additionally, developers should be encouraged to document security decisions by triaging findings. This learning-oriented approach acknowledges that achieving perfection every time is not realistic, and organizations should aim to grow and improve together.

To further enhance developer capabilities, Gerlach suggests providing targeted security training. Leveraging the documented decisions made by developers, organizations can identify patterns within the context of their code and prioritize relevant training. This personalized approach allows for a more focused and impactful learning experience, such as addressing recurring cross-site scripting (XSS) errors in specific code segments.

Automation plays a vital role in the fourth step, which is automating security testing in continuous integration and continuous deployment (CI/CD) pipelines. By integrating security testing alongside other automated software tests, organizations can ensure that security becomes an integral part of the development process. Gerlach advises starting with automating tests for common web application threats like injection attacks, sensitive data exposure, and XSS vulnerabilities.

The final step emphasizes the importance of collaboration among development, security, and operations teams. Instead of merely passing vulnerability reports between teams, organizations should establish a foundation for effective teamwork. By implementing the previous steps, teams can work together to identify potential security risks and develop strategies to mitigate them. This collaborative approach creates a culture of shared responsibility and empowers all stakeholders to actively contribute to maintaining the organization’s security posture.

Gerlach’s recommendations provide a comprehensive framework for organizations looking to prioritize security without impeding their developers’ productivity. By engaging developers early in the AppSec process, involving the security team from the start, enabling self-help through tooling and documentation, providing targeted training, automating security testing, and fostering collaboration among teams, organizations can successfully shift security left while maintaining the speed and agility necessary for effective software development.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...