October 2, 2024 By Mark Stone 3 min read

It’s the 21st annual Cybersecurity Awareness Month, and we’re covering many different angles to help organizations manage their cybersecurity challenges. In this mini-series of articles, we’re focusing on specific job roles outside of cybersecurity and how their teams approach security.

For developers, cybersecurity has historically been a love-hate issue. The common school of thought is that coders are frustrated with having to tailor their work to fit within cybersecurity rules. However, many companies are embracing a security-first approach, and some developers are buying in.

Microsoft is one company that’s trying to change how software developers feel about security and is actively taking steps to train teams in concepts like threat intelligence and attacker motivation.

Siri Varma, tech lead and software development engineer with Microsoft Security, works with both developers and cybersecurity teams every day.

Here, Varma answers three key questions for us about the relationship between developers and cybersecurity:

What barriers exist between developers and cybersecurity?

First, they have different priorities. Developers often prioritize speed, functionality and time-to-market, while cybersecurity teams prioritize safety and risk mitigation. This can lead to friction when security policies impose measures that developers feel slow down their workflow.

For example, a security policy might mandate blocking all traffic to the internet by default to minimize exposure to potential attacks. This is a best practice to ensure that only necessary traffic is allowed, reducing the attack surface. However, developers may push back on this, wanting to delay this strict control because the effort required to identify and allow legitimate traffic can be time-consuming.

Next, there’s the knowledge gap; coders may lack the necessary understanding of security practices, and cybersecurity teams may not fully grasp the complexities of the development process.

For instance, a developer might configure an S3 bucket with public read access, believing it’s necessary for the app’s functionality. This oversight can expose all data in the bucket to anyone on the internet. On the other hand, cybersecurity teams might not fully appreciate the developer’s workflow and the constraints they face, which can lead to miscommunications about why certain security measures are challenging to implement.

Explore IBM DevOps solutions

What are common misunderstandings between the two groups?

The two most common misunderstandings are security as an afterthought and security as a checklist item.

Developers frequently consider security an afterthought. They may prioritize feature development and assume that security concerns can be addressed later in the process. This approach often leads to vulnerabilities being managed reactively.

For example, take the issue of public access to storage. Developers might initially configure storage with broad access permissions, intending to tighten them later. This approach can become complex, as it often requires analyzing network telemetry to determine which resources are accessing the storage, ensuring that necessary functionality remains intact while tightening access controls.

Plus, the view of security as merely a final checklist task rather than an integral part of the development culture needs to change. This shift can only be achieved by embedding security practices throughout the development process and creating a culture where security is a continuous and shared responsibility.

If the cybersecurity team can only implement one change, one request, for developers to improve their security posture, what would it be?

The most impactful request would be for developers to shift left on security — which integrates security earlier in the development process. This can be done through secure coding practices, automated security testing and regular code reviews with security in mind. By embedding security into the DevOps pipeline (DevSecOps), developers can catch and fix issues earlier, reducing both security risks and the cost of addressing vulnerabilities later in the process.

This integration is so crucial that the Open Worldwide Application Security Project (OWASP) Foundation has developed maturity models to guide organizations at various stages of DevSecOps implementation.

As the relationship between developers and cybersecurity teams continues to evolve, collaboration and sharing responsibility are more crucial than ever. By embedding security into the development process from the start, organizations can build stronger defenses against emerging threats as they foster a culture where security fits naturally into development.

 

More from Risk Management

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

6 Principles of Operational Technology Cybersecurity released by joint NSA initiative

4 min read - Today’s critical infrastructure organizations rely on operational technology (OT) to help control and manage the systems and processes required to keep critical services to the public running. However, due to the highly integrated nature of OT deployments, cybersecurity has become a primary concern.On October 2, 2024, the NSA (National Security Agency) released a new CSI titled “Principles of Operational Technology Cybersecurity.” This new guide was created in collaboration with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD SCSC) to…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today