Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why Citizen Developers Introduce Risk and Require CISO Oversight
Cybersecurity

Why Citizen Developers Introduce Risk and Require CISO Oversight

Frank DomizioBy Frank DomizioJanuary 23, 2023Updated:February 3, 20236 Mins Read
Facebook Twitter LinkedIn Email
citizen developers
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Analysts Frank Domizio and Paul Swider collaborate to discuss citizen developers and what they mean for a company’s security.

Citizen developers are non-professional developers who use low-code or no-code platforms to create custom applications and solutions. They often do this as a means of automating business processes or creating custom tools that meet their organization’s specific needs. With the rise in hybrid development, low-code and enterprise developers have started forming project teams to create solutions.

While citizen developers can be a valuable asset to an organization, they also present some unique security risks that chief information security officers (CISOs) need to manage. For example, today, many finance, insurance, healthcare, and health life science organizations collect personal information, including medical or clinical data. A CISO is responsible for securing protected health information (PHI). What if low-code teams were involved with this data collection? The CISOs would need to communicate with and guide the low-code teams and confirm the appropriate compliance tools are in place to assist with data breaches or leakage.

In this analysis, we’ll discuss the risks involved with having citizen developers in your environment and how CISOs can help them be successful. We’ll also discuss some ideas around governance and compliance, third-party apps, and workflows that will help make sure you have success with low-code solutions.

The Risk of Citizen Developers

The primary risk associated with citizen developers is their lack of formal training in secure coding practices. Many may not have a computer science or software engineering background, and as such, may not be familiar with best practices for writing secure code. This can lead to vulnerabilities being introduced into custom applications, which can be exploited by malicious actors.

Another risk is that citizen developers may not be aware of the various security controls that are available to them when building custom applications. For example, they may not realize the importance of proper authentication and authorization control implementation, or of protecting sensitive data in transit and at rest.

How CISOs Can Guide Citizen Developers

CISOs can lessen the risk that comes with citizen developers by giving them strong guidance. Guidance can take the form of training on secure coding practices, as well as providing access to resources such as secure coding standards and guidelines.

In addition, the CISO can work with citizen developers to establish a secure development lifecycle (SDL) for custom applications. This can involve establishing a set of security standards that must be followed when building custom applications, as well as providing guidance on how to deploy applications in a secure manner.

It is also important for the CISO to establish clear communication channels with citizen developers so that they can seek guidance and ask questions as needed. This can help to ensure that citizen developers are aware of the latest security best practices and that they are able to incorporate these practices into their custom applications.

Governance and Compliance

Some organizations may have already developed a team responsible for low-code governance and compliance. Sometimes the compliance and governance teams may be different groups. It is strongly recommended that the CISO have visibility into any existing compliance and governance efforts related to low-code to ensure the group efforts match the current compliance and governance of the broader organization’s infosec policies. In addition, these governance and compliance groups can help facilitate communication from the CISO to the low-code developers.

Third-Party Apps

Usually, when dealing with compliance issues and low-code, organizations turn to tools that assist with data leakage and data sharing. Compliance concerns might include visibility into both the apps the organization creates and any third-party low-code solutions.

This is a critical conversation for both the low-code teams and the CISO, but often overlooked. Questions that must be asked include: What third-party apps are we using to build low-code solutions, and what are the capabilities or risks of these apps? Who can create an app? What are the appropriate processes and tools for SDL? Where should data be stored, and how should it be accessed?

See our Top 10 Cybersecurity Vendor Shortlist

Governance plans, centers of excellence, and third-party tools tend to address some of the above- mentioned issues but, to ensure their directions are implemented, there need to be solid communication channels between the CISO and development teams.

Another use case is when the organization purchases a third-party industry low-code solution as a SaaS package. Low-code SaaS solutions may require external contractors to access internal data and networking resources, and the CISO should have access to these details.

The CISO should also consider communicating with vendors working on low-code solutions. Often low-code developers will be internal to the organization; however, some organizations will hire contractors or vendors to build solutions.

Low-Code Workflow

Another consideration for the CISO is that many low-code platforms implement workflows and business processes using connectors or adapters to other systems. Low-code workflows and business processes can include email or omnichannel for notifications, credit checks and banking processes, collaboration software, databases, and more. The CISO should ensure there is a process to vet any low-code workflow connectors, especially connectors that extend to third-party apps.

As low-code teams build apps and integrate with enterprise line-of-business apps, the risk of downtime increases, and system downtime can be a security risk. Communication between the CISO and teams is critical in these scenarios. Ask the low-code teams what core line of business systems they are integrating with or extending to.

Sometimes, the communication needs to be bi-directional. Many low-code platforms run mostly in the cloud and are layered on existing technology stacks. SAP, Oracle, Microsoft, and Salesforce are some examples. Suppose an organization uses a low-code platform layered on a vendor’s cloud stack. In this case, the CISO should consider implementing a communication process to alert developers of any security bulletins from the underlying cloud provider.

Final Thoughts

Don’t be lulled into thinking that low-code assets are the only assets that require security vigilance. The CISO should ensure that any assemblies, database functions, or other back-end code created by enterprise developers adhere to established best practices.

Overall, citizen developers can be a valuable asset to an organization, but it is important for the CISO to provide guidance and support to ensure that custom applications are developed in a secure manner. By providing training and resources, establishing an SDL, implementing governance, and considering the implications of third-party relationships, the CISO can help to minimize the security risks associated with citizen development and ensure that custom applications are a benefit rather than a liability.

Which companies are the most important vendors in cybersecurity? Click here to see the Acceleration Economy Top 10 Cybersecurity Shortlist, as selected by our expert team of practitioner analysts.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

CISO citizen developer Compliance CXO Cybersecurity featured governance low-code/no-code software development
Share. Facebook Twitter LinkedIn Email
Frank Domizio
  • LinkedIn

Frank Domizio is an Acceleration Economy Analyst focusing on Cybersecurity. As a retired Philadelphia Police Officer, Frank got his start in cybersecurity while he was detailed to the FBI as a digital forensic examiner. Since then, Frank has held many positions in and around the federal government specializing in Cyber Threat Intelligence and Incident Response. Now, as a Federal Civilian for an Executive Branch Agency, Frank is a student of the strategy and leadership that goes into making a successful cybersecurity program. He is also an adjunct professor of cybersecurity at the University of Maryland Global Campus. Frank holds a Bachelor of Science in Computing Security Technology from Drexel University and a Master of Science in Cyber and Information Security from Capitol College as well as many industry certifications. As a Federal Government Employee Frank’s views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Google’s Vision for Gemini Super Assistant, Universal Capabilities

May 30, 2025

Accelerate, Assist, Transform: A Framework for AI Adoption Success

May 30, 2025

Google Offers First-of-Its-Kind GenAI Certification for Managers

May 30, 2025

Marc Benioff Is Transforming World’s Largest Apps Vendor into AI-Data Powerhouse

May 29, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Google’s Vision for Gemini Super Assistant, Universal Capabilities
  • Accelerate, Assist, Transform: A Framework for AI Adoption Success
  • Google Offers First-of-Its-Kind GenAI Certification for Managers
  • Marc Benioff Is Transforming World’s Largest Apps Vendor into AI-Data Powerhouse
  • AI Agents Are Here: Why C-Suite Leaders Should Pay Attention Now

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.