Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Shifting Security Left via Codification
Cybersecurity

Shifting Security Left via Codification

Chris HughesBy Chris HughesJanuary 26, 2022Updated:July 27, 20224 Mins Read
Facebook Twitter LinkedIn Email
Codification & Security
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

The rush to adopt cloud computing has driven one of the most prevalent technology and paradigm shifts today. A paradigm shift that can be summed up in one phrase – the increased use of Infrastructure-as-Code (IaC). Traditional legacy IT environments required physically setting up and configuring hardware and infrastructure through manual processes. With the advent of cloud computing and the growth of IaC, organizations are now provisioning IT infrastructure through machine-readable files, which can be templatized, reusable and portable. There are many flavors, whether you’re dealing with Cloud Service Provider (CSP) native options such as Amazon Web Services (AWS)’s CloudFormation or Microsoft Azure’s ARM templates and blueprints. That said, your choices aren’t limited to CSP-native options, and there are vendor agnostic options as well, the most popular being Terraform by HashiCorp.

This paradigm shift hasn’t only transformed infrastructure and operations of IT environments but is also bringing many security benefits as well. Much like the manual activities of provisioning infrastructure in the days of legacy IT environments, security traditionally has handled IT security policies in a manual “paper” based fashion. This generally included articulating policies for IT systems in Word and PDF documents and then going out and validating that systems were provisioned and configured in a manner that aligned with said policies. This is an incredibly tedious, cumbersome, and inefficient way of approaching security.

There’s been a big desire to “shift security left”. This typically refers to bringing security earlier in the software or system development life cycle. Security is often referred to as being bolted-on, rather than baked-in. This traditionally has materialized as delivery delays, increased cost, re-work, tension between Developers and Security, and more. Shifting security left’s benefits include faster delivery, reduced costs, mitigating risks before they reach runtime environments, and more.

With the widespread adoption of IaC, we’re now seeing concurrent adoption of Policy-as-Code (PaC). PaC essentially articulates policies in code, which supports several benefits. These include guardrails for automated verification of activities, codification of organizational security policies, version control, and simply a more effective and efficient method of security policy enforcement. There are several PaC vendors as well as Open Source options for organizations to choose from. Two of the most notable vendors are BridgeCrew and Accurics, which were recently acquired by Palo Alto and Tenable respectively, indicating that large security vendors are seeing the promise as well. There are also OSS options, such as Open Policy Agent which is aligned very well for cloud-native environments. Some of the vendors also have OSS options that are free, and support over 1500+ pre-existing policies you can leverage that run the gamut across some of the most notable compliance standards, such as SOC2, PCI, HIPAA, NIST, and more. So rather than having security and compliance violations identified in runtime environments when infrastructure has been provisioned, you’re able to lean into PaC capabilities and catch these concerns far sooner in the SDLC. There’s also the benefit of being able to run these tools against your production environments as well, which helps catch drift, compliance deviation and ensure you keep your workloads in a “known good” state. This sort of capability simply wasn’t possible in the manual-centric legacy IT environments. Not only is it promising from the security perspective but it also helps bridge the gap of the ever-pervasive security workforce shortage. Technologies such as PaC perform activities at a pace and scale that humans never could.

All of the promises aren’t without peril though either. Since IaC templates can be codified, published, and shared freely, there are countless available in repositories across the web. On the surface this seems incredible, you can just go take them and use them to speed up provisioning your environments and configuring things. Research from vendors such as BridgeCrew and Palo Alto’s Unit 42 has identified that much like OSS code, freely available IaC templates are littered with vulnerable configurations that could put your organization at risk. For this reason, it is key to leverage PaC tooling to ensure the IaC templates you’re putting in place align with your organizational security and compliance requirements as well as vendor best practices on hardened configurations.

The increased codification of IT is leading to innovations that weren’t possible in legacy IT environments. By leveraging PaC you’re able to bake in security requirements, implement guardrails for developers driving business value and speed up time to value for your stakeholders. This is the new paradigm of cybersecurity in cloud-native environments

Compliance featured security
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

NTT DATA & Google Cloud Collaborate to Customize AI for Key Sectors

August 22, 2025

AI Agent & Copilot Podcast: AI Expert Will Hawkins Details 3 Agent Orchestration Models

August 22, 2025

AI and Cloud Drive Oracle’s Next-Gen Electronic Health Record System

August 22, 2025

Hyperscalers Pump $1 Billion Per Day into CapEx but Can’t Meet AI Demand

August 21, 2025
Add A Comment

Comments are closed.

Recent Posts
  • NTT DATA & Google Cloud Collaborate to Customize AI for Key Sectors
  • AI Agent & Copilot Podcast: AI Expert Will Hawkins Details 3 Agent Orchestration Models
  • AI and Cloud Drive Oracle’s Next-Gen Electronic Health Record System
  • Hyperscalers Pump $1 Billion Per Day into CapEx but Can’t Meet AI Demand
  • AWS, Microsoft, Google, Oracle Daily CapEx Spending Hits $1 Billion!

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains

July 10, 2025

Using Agents and Copilots In M365 Modern Work

March 11, 2025

AI Data Readiness and Modernization: Tech and Organizational Strategies to Optimize Data For AI Use Cases

February 21, 2025

Special Report: Cloud Wars 2025 CEO Outlook

February 12, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }