Skip to main content

Shifting hard left: Why securing IaC is the next step in compliant software development

The accelerated CI/CD practices that cloud environments have enabled has led many developer teams to create automated script tools that replace the manual configuration and provisioning of apps by communicating directly with the cloud provider’s API. This approach to software production is known as Infrastructure-as-Code (IaC), and essentially forms the building blocks upon which the rapid deployment and update of apps and web services via the cloud is based. In other words, developers don’t have to keep building the same launch pad whenever they want to quickly tweak an app’s functionality, but can instead use a pre-existing IaC template.

IaC speeds up deployment, eliminates one-off non-standard configurations, and builds consistency and repeatability into the software provisioning process. But while this type of automation is a major boon for developers, it’s a potential source of vulnerability if there’s a flaw in the template itself. This is the flipside of agility: when simple configuration changes can leave sensitive data and private servers exposed in the cloud, the security implications of this level of automation are profound.

As such, the next step in shifting left in software development is to push security compliance to the very start of the process by ensuring that the IaC templates, the initial foundation upon which code is written, are free from known vulnerabilities. Up until now, the nature of the templates has proven to be problematic for traditional security teams, and may explain why they have continued to favour a reactive posture, because the software platforms on which the templates are written – CloudFormation, Terraform etc – are not familiar to them. However, a new generation of automated scanning tools enables pre-deployment static analysis of IaC templates, treating them just like any other piece of code and performing the relevant security and compliance tests.

Just as tools have been developed specifically for the cloud to automate and speed up all stages of the software process, so too do security solutions now exist that support the non-stop CI/CD paradigm from beginning to end. But tools won’t change the post-deployment fix culture on their own – that will only happen when developer and security teams work closer together rather than in opposition to each other. Security must accept that it’s both possible and desirable to enforce corporate policies before run-time, while developers must allow security to be involved from the ground up.

The closer we can shift “hard left” and push security consciousness to the very start of the process, the nearer we will be to establishing a threat protection model that’s based on proactive prevention rather than reactive remediation.

The post Shifting hard left: Why securing IaC is the next step in compliant software development appeared first on SD Times.



from SD Times https://ift.tt/3mm7lez

Comments

Popular posts from this blog

Difference between Web Designer and Web Developer Neeraj Mishra The Crazy Programmer

Have you ever wondered about the distinctions between web developers’ and web designers’ duties and obligations? You’re not alone! Many people have trouble distinguishing between these two. Although they collaborate to publish new websites on the internet, web developers and web designers play very different roles. To put these job possibilities into perspective, consider the construction of a house. To create a vision for the house, including the visual components, the space planning and layout, the materials, and the overall appearance and sense of the space, you need an architect. That said, to translate an idea into a building, you need construction professionals to take those architectural drawings and put them into practice. Image Source In a similar vein, web development and design work together to create websites. Let’s examine the major responsibilities and distinctions between web developers and web designers. Let’s get going, shall we? What Does a Web Designer Do?

A guide to data integration tools

CData Software is a leader in data access and connectivity solutions. It specializes in the development of data drivers and data access technologies for real-time access to online or on-premise applications, databases and web APIs. The company is focused on bringing data connectivity capabilities natively into tools organizations already use. It also features ETL/ELT solutions, enterprise connectors, and data visualization. Matillion ’s data transformation software empowers customers to extract data from a wide number of sources, load it into their chosen cloud data warehouse (CDW) and transform that data from its siloed source state, into analytics-ready insights – prepared for advanced analytics, machine learning, and artificial intelligence use cases. Only Matillion is purpose-built for Snowflake, Amazon Redshift, Google BigQuery, and Microsoft Azure, enabling businesses to achieve new levels of simplicity, speed, scale, and savings. Trusted by companies of all sizes to meet

2022: The year of hybrid work

Remote work was once considered a luxury to many, but in 2020, it became a necessity for a large portion of the workforce, as the scary and unknown COVID-19 virus sickened and even took the lives of so many people around the world.  Some workers were able to thrive in a remote setting, while others felt isolated and struggled to keep up a balance between their work and home lives. Last year saw the availability of life-saving vaccines, so companies were able to start having the conversation about what to do next. Should they keep everyone remote? Should they go back to working in the office full time? Or should they do something in between? Enter hybrid work, which offers a mix of the two. A Fall 2021 study conducted by Google revealed that over 75% of survey respondents expect hybrid work to become a standard practice within their organization within the next three years.  Thus, two years after the world abruptly shifted to widespread adoption of remote work, we are declaring 20