For years we have repeated a mantra: you have to "move security to the left" and ask developers to assume more security responsibilities while writing and testing code. The idea was seductive: fixing problems early is cheaper, and if development teams incorporate checks from the beginning everything will be faster and safer. However, reality shows that this "shift left" bet did not solve the central problem. In many environments the tension between speed and security has intensified and, above all, developers have ended up bearing an unsustainable cognitive burden.
The problem is not the laziness of the developers; it is the incentive model and the pressure to deliver quickly. When business requires functionalities, short-term and measurable results, it is delivery that is a premium. If a safety check takes hours and blocks the build, the pressure to draw it appears naturally. In this breeding stock, pragmatic solutions such as pulling public images from registries facilitate progress, but also introduce risks that are difficult to control.

A good example of what can fail comes from the industry's own analysis. The Qualys research team examined tens of thousands of public container images and found alarming results: from a very wide sample, thousands of images presented malicious behavior or sensitive content embedded. Among these findings were cryptominery integrated into a large part of the malicious and secret samples (AWS keys, GitHub tokens, database credentials) preserved within the image layers. You can read the report and technical details on the Qualys blog about this study Here..
The conceptual error is to treat public repositories as curated and reliable libraries by default. Platforms such as Docker Hub, cloud vendor records and other public services facilitate distribution, but the mere presence of an image in these spaces does not guarantee that it is safe. Download an open image is, in essence, a decision of trust; and that trust may be misplaced.
So what do you do? The answer is to move security in another direction: not more "shift left" only on the developer's shoulder, but a strategy that reduces responsibility and controls to the infrastructure and platform layer. Instead of asking each engineer to remember scanning, hardening and auditioning manually, we must offer safe ways that are simple and fast to follow.
A key piece is the creation of an internal repository that acts as a quarantine of external artifacts. All external images should go through a proxy or internal registry that inspects, signs and approves artifacts before they enter the pipelines. Device management tools like Harbor can help build this type of intermediate layer and automate acceptance policies; see more in the project Harbor.
In practice it is also worth defining a "golden path" for developers: standard templates, approved base images and official pipelines that guarantee default security. If the teams follow that path, security becomes something transparent to them. If someone needs to get out of the pattern, then it requires additional reviews and manual processes that justify that risk to the business.
Policy and control tools in infrastructure are part of the solution. Declarative policies applied with Terraform modules, Crossplane compositions or rules in Open Policy Agent prevent repetitive human errors: for example, prevent unversioned S3 bucket or refuse to display with images that do not meet minimum requirements. Open Policy Agent offers a framework for encoding these types of restrictions and can be integrated into pipelines and admission controllers; consultation Open Policy Agent for more information.
Similarly, automation must cover both detection and response. Container scans have to be run within the CI / CD and Kubernetes' admission controllers should prevent containers with critical vulnerabilities from reaching the cluster. In running time, the tools should not be limited to generating alerts; in the face of proven malicious behavior, the system should be able to isolate and kill compromised loads, and even mark nodes for automatic containment. The official documentation on admission controllers in Kubernetes explains how these mechanisms work: Kubernetes admission controllers.
It is also smart to adopt approaches that automate the correction: if a vulnerability is detected in a base image, the platform can generate a Pull Request to automatically update it and, after validation, promote the secure version. This type of flow reduces exposure time and reduces the load on equipment that should not spend its time on repetitive maintenance tasks.

This does not mean that security will stop working with development; on the contrary, it requires a closer and more proactive relationship. Security and platform must understand business requirements and work to make safe delivery the fastest and most economical option. This avoids the conflict between meeting business objectives and respecting security controls, because both are aligned in the same infrastructure.
Cultural change is also relevant: stop blaming developers for shortcuts and start designing systems that prevent shortcuts. Models such as DevSecOps remain valid, but their implementation has to be directed towards simplification and effective automation. Resources from agencies such as OWASP or NIST provide guides and frameworks to understand risks in the software supply chain and how to mitigate them; see for example the OWASP SAMM project and NIST publications on supply chain security: OWASP SAMM and NIST - Software Supply Chain Security.
The conclusion is clear: if we continue to carry responsibility over the shoulders of already overloaded developers, we will get evasions and exposure. Instead, we need platforms that make the option safe also the easy option. Security must "move down" in the stack, being incorporated into the infrastructure and automated, so that the business gets speed without sacrificing control or protection. For those who want to deepen in specific analysis and recommendations, the Qualys study is a good starting point and is available on their technical blog Here. and if solutions for cloud-native environments are being evaluated, Forrester's report on CNAPP is another useful reference available through Qualys.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...