Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Shifting Security Left via Codification
Cybersecurity

Shifting Security Left via Codification

Chris HughesBy Chris HughesJanuary 26, 2022Updated:July 27, 20224 Mins Read
Facebook Twitter LinkedIn Email
Codification & Security
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

The rush to adopt cloud computing has driven one of the most prevalent technology and paradigm shifts today. A paradigm shift that can be summed up in one phrase – the increased use of Infrastructure-as-Code (IaC). Traditional legacy IT environments required physically setting up and configuring hardware and infrastructure through manual processes. With the advent of cloud computing and the growth of IaC, organizations are now provisioning IT infrastructure through machine-readable files, which can be templatized, reusable and portable. There are many flavors, whether you’re dealing with Cloud Service Provider (CSP) native options such as Amazon Web Services (AWS)’s CloudFormation or Microsoft Azure’s ARM templates and blueprints. That said, your choices aren’t limited to CSP-native options, and there are vendor agnostic options as well, the most popular being Terraform by HashiCorp.

This paradigm shift hasn’t only transformed infrastructure and operations of IT environments but is also bringing many security benefits as well. Much like the manual activities of provisioning infrastructure in the days of legacy IT environments, security traditionally has handled IT security policies in a manual “paper” based fashion. This generally included articulating policies for IT systems in Word and PDF documents and then going out and validating that systems were provisioned and configured in a manner that aligned with said policies. This is an incredibly tedious, cumbersome, and inefficient way of approaching security.

There’s been a big desire to “shift security left”. This typically refers to bringing security earlier in the software or system development life cycle. Security is often referred to as being bolted-on, rather than baked-in. This traditionally has materialized as delivery delays, increased cost, re-work, tension between Developers and Security, and more. Shifting security left’s benefits include faster delivery, reduced costs, mitigating risks before they reach runtime environments, and more.

With the widespread adoption of IaC, we’re now seeing concurrent adoption of Policy-as-Code (PaC). PaC essentially articulates policies in code, which supports several benefits. These include guardrails for automated verification of activities, codification of organizational security policies, version control, and simply a more effective and efficient method of security policy enforcement. There are several PaC vendors as well as Open Source options for organizations to choose from. Two of the most notable vendors are BridgeCrew and Accurics, which were recently acquired by Palo Alto and Tenable respectively, indicating that large security vendors are seeing the promise as well. There are also OSS options, such as Open Policy Agent which is aligned very well for cloud-native environments. Some of the vendors also have OSS options that are free, and support over 1500+ pre-existing policies you can leverage that run the gamut across some of the most notable compliance standards, such as SOC2, PCI, HIPAA, NIST, and more. So rather than having security and compliance violations identified in runtime environments when infrastructure has been provisioned, you’re able to lean into PaC capabilities and catch these concerns far sooner in the SDLC. There’s also the benefit of being able to run these tools against your production environments as well, which helps catch drift, compliance deviation and ensure you keep your workloads in a “known good” state. This sort of capability simply wasn’t possible in the manual-centric legacy IT environments. Not only is it promising from the security perspective but it also helps bridge the gap of the ever-pervasive security workforce shortage. Technologies such as PaC perform activities at a pace and scale that humans never could.

All of the promises aren’t without peril though either. Since IaC templates can be codified, published, and shared freely, there are countless available in repositories across the web. On the surface this seems incredible, you can just go take them and use them to speed up provisioning your environments and configuring things. Research from vendors such as BridgeCrew and Palo Alto’s Unit 42 has identified that much like OSS code, freely available IaC templates are littered with vulnerable configurations that could put your organization at risk. For this reason, it is key to leverage PaC tooling to ensure the IaC templates you’re putting in place align with your organizational security and compliance requirements as well as vendor best practices on hardened configurations.

The increased codification of IT is leading to innovations that weren’t possible in legacy IT environments. By leveraging PaC you’re able to bake in security requirements, implement guardrails for developers driving business value and speed up time to value for your stakeholders. This is the new paradigm of cybersecurity in cloud-native environments

Compliance featured security
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Agentic AI in Government: Salesforce Achieves FedRAMP High for Agentforce and More

June 25, 2025

Snowflake Ventures Invests in Diskover to Tackle Unstructured Data at Scale

June 25, 2025

Microsoft, Gong Detail How AI and Integration Partnership Drives Higher Sales Performance

June 24, 2025

AI Industrialization of America Rolls On as AWS Plans Data Centers in Coal Country

June 24, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Agentic AI in Government: Salesforce Achieves FedRAMP High for Agentforce and More
  • Snowflake Ventures Invests in Diskover to Tackle Unstructured Data at Scale
  • Microsoft, Gong Detail How AI and Integration Partnership Drives Higher Sales Performance
  • AI Industrialization of America Rolls On as AWS Plans Data Centers in Coal Country
  • Snowflake to Acquire Crunchy Data to Power Agentic AI with PostgreSQL Integration

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.