Is Shift Left Really Rusty in Cybersecurity?
I sent my colleague Richard Isenberg an otter pup to live in Atlanta with him, given his team's stellar session on "Prioritizing Technology Risks" at McKinsey & Company 's recent #Cloud Leadership Forum. I am not sure this is wise.
- Sherman is named after the great Union general, but Rich addresses him as the "Shermanator," after a character in <checks notes> the "American Pie" series of movies
- Rich lets the otter spend most of his time hanging out by the pool in his backyard, drinking wine.
Perhaps Rich should encourage the young otter the read more about #cybersecurity? (I'm getting better at transitions?)
Chris H. recently published an issue of "Resilient Cyber" in which he asked some interesting questions about #Shiftleft -- even though I think I disagree with some of this conclusion
1. Is Shift Left based on a misapprehension?
Shift left aims to eliminate cybersecurity vulnerabilities as early as possible in the development or engineering lifecycle. He does yeoman work calling into question some of the factoid that get tossed around justifying shift left. God save the enterprise technology world from catchy factoids, but I don't think he debunks the concept.
Recommended by LinkedIn
2. Does Shift Left prevent #cyberattacks that diminish market value?
3. Has the implementation of shift left been too tool-centric?
- Hell, yes. Hell, yes -- just like everything else in cybersecurity
- Hughes refers positively to #threatmodelling. I would argue that threat modelling is step one in shift left, with teaching developers to write better code being step 2.
- I recommend Stephen Biddle's book "Military Power: Explaining Victory and Defeat in Modern Battle" so often that people joke about it, but better "force employment" will almost always beat better weapons.
4. Does Shift Left degrade developer experience?
What have other experiences with shift left been?