Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How to Balance Risk and Empowerment with Low-Code/No-Code Apps
Cybersecurity

How to Balance Risk and Empowerment with Low-Code/No-Code Apps

Robert WoodBy Robert WoodOctober 20, 2022Updated:December 1, 20224 Mins Read
Facebook Twitter LinkedIn Email
Low-code/no-code risk security
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

For a long time, the development of scripts, software, or small bits of automation has been relegated to software engineers. However, the introduction of low-code/no-code applications has helped the development-opportunities pendulum swing to roles that don’t require software backgrounds. These low-code/no-code applications enable people to automate parts of their day-to-day jobs and bring their creativity to figure out how to make their jobs easier to bear.

These applications typically function by allowing a user to connect the functionality between their daily tools to one another, creating a flow. For example, Slack connects to email, which connects to the calendar, and then connects to Box, and so on. Additionally, small pieces of automation can be shared among users within an organization.

This article will explore several areas of risk that can emerge with the adoption of low-code/no-code applications and includes areas that security teams may benefit from considering in the risk assessment and threat-modeling process.

Permissions

Low-code/no-code applications typically get their start through a series of integrations. The integrations depend on the particular automated workflows that interest users. Authorizing a tool may very likely be an all-or-nothing decision. In an effort to achieve the intended automation benefit, knowing the applications they need to work with, we can draw from observations about how users have dealt with permissions in mobile applications.

Educating users on the permissions they are potentially enabling through the use of these applications is important. Similarly, security teams need to be cognizant of these integrations and the permission boundaries that could exist with these applications.

Cross-Team Access

Authorized applications and the permissions associated with them become associated with the low-code/no-code application in use. Teams that collaborate on automated workflows are able to tap into the originally authorized permission. This can prevent issues considering one user’s resources being exposed to another. This becomes more troubling if the originally authorizing user happens to have heightened permissions within the authorized application.

For example, a Slack administrator authorizes Slack and is collaborating with multiple team members to build automated workflows between Slack and other applications. That original authorization has heightened permissions associated with it. If abused by any of the other team members, the potential impact could be much higher.

Data Storage and Boundaries

Processes by their very design take place over multiple steps. The state needs to be stored throughout that process, which is likely going to be handled by the low-code/no-code application being used to drive the process. Output from one integration passed into another and so on until the final decision or action can be performed. Where that state is maintained matters; data flowing to unexpected places can be problematic for organizations with strict compliance requirements. This can also be problematic when attempting to determine system boundaries and gain a realistic appraisal of the environment, whether that’s for threat modeling or audit purposes.

This particular part of the low-code/no-code solution space is challenging. Creating enforceable policies around the intersection of permissions of a given application, data flows, and user roles is not something that exists in a mature state today. Security teams are, therefore, left to respond with their best effort; “enable the business” but also protect the business. This is hard when the tools are unavailable to set effective guardrails, however, security teams can employ other approaches such as awareness training, restrictive admin access, or threat modeling to manage risk.

Concluding Thoughts

The growth of low-code/no-code solutions in today’s market is exciting. Security teams have a big opportunity to rally behind the empowerment position by safely supporting these solutions in their environments, potentially leveraging them for their own business processes. Careful thought is needed, though, as to how these solutions get deployed, how they are managed, who is allowed to use them, how data flows through them, and how the permission boundaries evolve because of them. These are all important considerations in the “yes and” conversations that the security community continues to engage in.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

apps Cybersecurity featured low-code/no-code risk software software development
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Workday Empowers Digital Workforce with Agent System of Record and Global Partnerships

June 13, 2025

AWS Launches MCP Servers to Supercharge AI-Assisted App Development

June 13, 2025

Oracle Surges on AI Boom as FY26 Cloud Growth to Blow Past 40%

June 12, 2025

Cognizant and ServiceNow Unite to Centralize IT, HR, and Customer Service with AI

June 12, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Workday Empowers Digital Workforce with Agent System of Record and Global Partnerships
  • AWS Launches MCP Servers to Supercharge AI-Assisted App Development
  • Oracle Surges on AI Boom as FY26 Cloud Growth to Blow Past 40%
  • Cognizant and ServiceNow Unite to Centralize IT, HR, and Customer Service with AI
  • AI Agent Security: Red Teaming Emerges as Solution to Broad Range of Threat Categories

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.