• About
  • Subscribe
  • Contact
Friday, May 9, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Resources Blogs

Use platform engineering to scale app security practices

Manjunath Bhat by Manjunath Bhat
July 10, 2023
Use platform engineering to scale app security practices

Photo by Pixabay: https://www.pexels.com/photo/three-people-sitting-beside-table-416405/

Share on FacebookShare on Twitter

Scaling DevSecOps practices across product teams is critical but difficult to achieve. Software engineering leaders leading platform teams should integrate pertinent security tools as part of internal developer platforms to deliver secure software at scale.

See Gartner research for a sample listing of tools – Cool Vendors in Platform Engineering for Scaling Application Security Practices and How to Select DevSecOps Tools for Secure Software Delivery.

A platform approach to supporting DevSecOps workflows reduces the potential attack surface while still enabling development teams to deliver at scale.

Instead of having individual product teams implement security tools and practices at their own discretion, platform teams must provide “secure paved roads.” This ensures consistency and reduces the cognitive load of implementing security controls. The idea is to make the secure path the default path to production.

There are two prerequisite actions to making the secure path, the default path:

First, secure the software supply chain

Second, adopt a platform approach to application security

See Figure 1 for a reference model that shows how security capabilities can be integrated with IDPs.

Figure 1

Why integrate security tools as part of IDPs

Supply-chain levels for software artefacts, or SLSA (pronounced “salsa”) is a security framework – a checklist of standards and controls to prevent tampering, improve integrity, and secure packages and infrastructure.

One of the guiding principles of SLSA is to minimise the number of trusted platforms used for software development and execution. This is because platforms expand the attack surface for software supply chain attacks. Therefore, minimising the number of platforms decreases the attack surface.

Related:  PodChats for FutureCISO: The business value of DMARC

As we saw in the case of SolarWinds, software development pipelines can be a prime target for supply chain attacks. Hardening platforms so they can be trusted involves significant effort and expensive manual work. Therefore, concentrating trust in fewer tools and platforms reduces cost, effort and risk. This is why we recommend IDPs and also integrating security workflows as part of IDPs.

Concentrate trust in shared infrastructure. For example, instead of each team within an organisation maintaining their own build platform, use a shared build platform.

- Source: Guiding Principles, SLSA

Gartner survey data reveals a missed opportunity

Platform teams focus on improving developer experience, developer productivity, software quality and delivery speed. According to Gartner’s 2022 Software Engineering Leaders Role Survey, only 25% of respondents cited “reduced security risks’’ as one of the top three goals for platform engineering and only 6% ranked it as the topmost goal. See Figure 2.

Using platform engineering to scale application security practices across the organisation is often an underappreciated and missed opportunity.

Figure 2

First published on Gartner Blog Network

Tags: application securityDevSecOpsGartnerplatform engineeringSLSA
Manjunath Bhat

Manjunath Bhat

Manjunath (Manju) Bhat is a Sr. Director Analyst within I&O responsible for managing the research agenda for DevOps. He advises clients on a range of DevOps-related initiatives that include site reliability engineering (SRE), chaos engineering, programmable infrastructure, DevSecOps, DevOps toolchains and agile best practices. Bhat sees the shift from project to product-based operating models alongside a transition to cloud-native architectures as two tectonic shifts affecting DevOps. In addition, his coverage extends to SaaS Management platforms, unified endpoint management tools and workplace analytics with a focus on securing the digital workplace.

No Result
View All Result

Recent Posts

  • DDoS attacks surge in Asia Pacific, claims Cloudflare
  • Reimagining security for the AI Era
  • PodChats for FutureCISO: Articulating the business value of security in 2025
  • New standard for cybersecurity at the storage layer
  • Cybersecurity challenges persist despite improved defenses

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl