Shift Left failed: security must move down in the stack to achieve speed without sacrificing control

Published 5 min de lectura 104 reading

For years we have repeated a mantra: you have to "move security to the left" and ask developers to assume more security responsibilities while writing and testing code. The idea was seductive: fixing problems early is cheaper, and if development teams incorporate checks from the beginning everything will be faster and safer. However, reality shows that this "shift left" bet did not solve the central problem. In many environments the tension between speed and security has intensified and, above all, developers have ended up bearing an unsustainable cognitive burden.

The problem is not the laziness of the developers; it is the incentive model and the pressure to deliver quickly. When business requires functionalities, short-term and measurable results, it is delivery that is a premium. If a safety check takes hours and blocks the build, the pressure to draw it appears naturally. In this breeding stock, pragmatic solutions such as pulling public images from registries facilitate progress, but also introduce risks that are difficult to control.

Shift Left failed: security must move down in the stack to achieve speed without sacrificing control
Image generated with IA.

A good example of what can fail comes from the industry's own analysis. The Qualys research team examined tens of thousands of public container images and found alarming results: from a very wide sample, thousands of images presented malicious behavior or sensitive content embedded. Among these findings were cryptominery integrated into a large part of the malicious and secret samples (AWS keys, GitHub tokens, database credentials) preserved within the image layers. You can read the report and technical details on the Qualys blog about this study Here..

The conceptual error is to treat public repositories as curated and reliable libraries by default. Platforms such as Docker Hub, cloud vendor records and other public services facilitate distribution, but the mere presence of an image in these spaces does not guarantee that it is safe. Download an open image is, in essence, a decision of trust; and that trust may be misplaced.

So what do you do? The answer is to move security in another direction: not more "shift left" only on the developer's shoulder, but a strategy that reduces responsibility and controls to the infrastructure and platform layer. Instead of asking each engineer to remember scanning, hardening and auditioning manually, we must offer safe ways that are simple and fast to follow.

A key piece is the creation of an internal repository that acts as a quarantine of external artifacts. All external images should go through a proxy or internal registry that inspects, signs and approves artifacts before they enter the pipelines. Device management tools like Harbor can help build this type of intermediate layer and automate acceptance policies; see more in the project Harbor.

In practice it is also worth defining a "golden path" for developers: standard templates, approved base images and official pipelines that guarantee default security. If the teams follow that path, security becomes something transparent to them. If someone needs to get out of the pattern, then it requires additional reviews and manual processes that justify that risk to the business.

Policy and control tools in infrastructure are part of the solution. Declarative policies applied with Terraform modules, Crossplane compositions or rules in Open Policy Agent prevent repetitive human errors: for example, prevent unversioned S3 bucket or refuse to display with images that do not meet minimum requirements. Open Policy Agent offers a framework for encoding these types of restrictions and can be integrated into pipelines and admission controllers; consultation Open Policy Agent for more information.

Similarly, automation must cover both detection and response. Container scans have to be run within the CI / CD and Kubernetes' admission controllers should prevent containers with critical vulnerabilities from reaching the cluster. In running time, the tools should not be limited to generating alerts; in the face of proven malicious behavior, the system should be able to isolate and kill compromised loads, and even mark nodes for automatic containment. The official documentation on admission controllers in Kubernetes explains how these mechanisms work: Kubernetes admission controllers.

It is also smart to adopt approaches that automate the correction: if a vulnerability is detected in a base image, the platform can generate a Pull Request to automatically update it and, after validation, promote the secure version. This type of flow reduces exposure time and reduces the load on equipment that should not spend its time on repetitive maintenance tasks.

Shift Left failed: security must move down in the stack to achieve speed without sacrificing control
Image generated with IA.

This does not mean that security will stop working with development; on the contrary, it requires a closer and more proactive relationship. Security and platform must understand business requirements and work to make safe delivery the fastest and most economical option. This avoids the conflict between meeting business objectives and respecting security controls, because both are aligned in the same infrastructure.

Cultural change is also relevant: stop blaming developers for shortcuts and start designing systems that prevent shortcuts. Models such as DevSecOps remain valid, but their implementation has to be directed towards simplification and effective automation. Resources from agencies such as OWASP or NIST provide guides and frameworks to understand risks in the software supply chain and how to mitigate them; see for example the OWASP SAMM project and NIST publications on supply chain security: OWASP SAMM and NIST - Software Supply Chain Security.

The conclusion is clear: if we continue to carry responsibility over the shoulders of already overloaded developers, we will get evasions and exposure. Instead, we need platforms that make the option safe also the easy option. Security must "move down" in the stack, being incorporated into the infrastructure and automated, so that the business gets speed without sacrificing control or protection. For those who want to deepen in specific analysis and recommendations, the Qualys study is a good starting point and is available on their technical blog Here. and if solutions for cloud-native environments are being evaluated, Forrester's report on CNAPP is another useful reference available through Qualys.

Coverage

Related

More news on the same subject.