Is Shift Left Really Rusty in Cybersecurity?

Is Shift Left Really Rusty in Cybersecurity?

I sent my colleague Richard Isenberg an otter pup to live in Atlanta with him, given his team's stellar session on "Prioritizing Technology Risks" at McKinsey & Company 's recent #Cloud Leadership Forum. I am not sure this is wise.

- Sherman is named after the great Union general, but Rich addresses him as the "Shermanator," after a character in <checks notes> the "American Pie" series of movies

- Rich lets the otter spend most of his time hanging out by the pool in his backyard, drinking wine.

Perhaps Rich should encourage the young otter the read more about #cybersecurity? (I'm getting better at transitions?)

Chris H. recently published an issue of "Resilient Cyber" in which he asked some interesting questions about #Shiftleft -- even though I think I disagree with some of this conclusion

1. Is Shift Left based on a misapprehension?

Shift left aims to eliminate cybersecurity vulnerabilities as early as possible in the development or engineering lifecycle. He does yeoman work calling into question some of the factoid that get tossed around justifying shift left. God save the enterprise technology world from catchy factoids, but I don't think he debunks the concept.

  • Shift left long predates its association with cybersecurity. Two decades ago we sought apply "shift left" optimizing end user support in #infrastructure organizations. Why? Because you could resolve a help desk ticket less for less than $20 and a deskside visit cost more than $75.
  • I'm as much of a quantitive empiricist as the next fella, but sometimes experience matters. Any of us who ever written any code know you want to catch flaws -- we all have the sleepless nights to prove the point.
  • I wouldn't fuss about the challenge in quantifying the benefits of shift left -- quantifying anything in application development is a tough proposition (but we are working on it).

2. Does Shift Left prevent #cyberattacks that diminish market value?

  • Yes, the linkage between cyberattacks and share price is tenuous
  • Many of the biggest public attacks involve #PII theft from B2C business. No this doesn't punish equity values. Most consumers are pretty "cheap and cheerful" when it comes to their customer data. B2C customers not so much, as any one who has sat through the security review for a provider of IT outsourcing or group health benefits will tell you.
  • And that doesn't even get us to questions of ransomware or cyber-espionage (which the implications may only surface years later).
  • In any event, the relationship between cyberattacks and business value is a question for the cybersecurity domain as a whole -- it's not specific to shift left

3. Has the implementation of shift left been too tool-centric?

- Hell, yes. Hell, yes -- just like everything else in cybersecurity

- Hughes refers positively to #threatmodelling. I would argue that threat modelling is step one in shift left, with teaching developers to write better code being step 2.

- I recommend Stephen Biddle's book "Military Power: Explaining Victory and Defeat in Modern Battle" so often that people joke about it, but better "force employment" will almost always beat better weapons.

4. Does Shift Left degrade developer experience?

  • Sometimes it sure as hell does. Hughes points out that security teams overload #CICD pipelines with poorly integrated #SAST and #SCA tools -- and that happens frequently.
  • But it doesn't happen always -- and we've seen plenty of instances where security teams have partnered with their #applicationdevelopment colleagues to design for #devex in deploying security tool in support of shift left principles.

What have other experiences with shift left been?


To view or add a comment, sign in

More articles by James Kaplan

  • Things I Was Too Stupid to Know When I Was Younger

    Things I Was Too Stupid to Know When I Was Younger

    Panic about Y2K. Dial-up internet.

    17 Comments
  • Hey, NYT, we read!

    Hey, NYT, we read!

    My god, the NY Times published a terrible op-ed piece today called, "There’s a Very Good Reason College Students Don’t…

    7 Comments
  • Reactions to 'Situational Awareness'

    Reactions to 'Situational Awareness'

    Amy and I dropped Adam off at Union College for his sophomore year yesterday. Union recently renamed its sports teams…

    2 Comments
  • Education, Podcasts and Enterprise Tech Skill-Building

    Education, Podcasts and Enterprise Tech Skill-Building

    As I have noted before, we live in an age of wonders for the truly geeky. In seconds, you can start reading almost any…

    17 Comments
  • Good technologists can and should write well!

    Good technologists can and should write well!

    Back from wintry Rhode Island, in wintry NYC and headed to wintry Chicago tomorrow, where there will be rain, snow and…

    11 Comments
  • Early Perspectives on Spectre & Meltdown

    Early Perspectives on Spectre & Meltdown

    Two newly discovered vulnerabilities, dubbed Meltdown and Spectre, are making headlines and raising questions about…

    1 Comment

Insights from the community

Others also viewed

Explore topics