Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Methods to Secure Low-Code Environments
Low Code / No Code

Methods to Secure Low-Code Environments

Bill DoerrfeldBy Bill DoerrfeldJune 2, 20215 Mins Read
Facebook Twitter LinkedIn Email
Share
Facebook Twitter LinkedIn Email

As more abstraction layers are added to the software development stack, developers are coding less from scratch. Low-code platforms are part of this movement, offering visual and text-driven means to stitch internal tools and workflows. In the process, low-code platforms are opening access for non-developers to solve the problems at hand. But what are some security repercussions of low-code platforms?

Depending on what data these platforms touch, ungoverned low-code use could break industry and government regulations. Without guardrails, “citizen developers” unaccustomed to programming procedures could unknowingly cause instability. Aside from user practices, insecure low-code platforms could hold broken dependencies and hit APIs that expose sensitive data.

I recently met with Kevin Garcia, Head of Product Marketing, Retool, to understand what security vulnerabilities low-code platforms pose. To Garcia, if ungoverned, low-code platforms could break data regulations and be prone to misuse. However, low-code shouldn’t mean high risk. Below, we’ll explore these potential failures and consider best practices to keep low-code platform security in check.

Low-Code Security Implications

First of all, due to data compliances, it’s often impossible for financial and healthcare businesses to leverage cloud services that store copies of customer data. “From a regulation and legal perspective, this is non-starter,” describes Garcia.

Low-code platforms are getting more usable and more adaptable. Garcia notes a big “aha” moment when users realize they can connect important data sources, such as customer information, with other environments. Yet, non-IT users may not have a good understanding of what they’re connecting to or who has access to what. “People often oversimplify how easy or not easy it is to tap into those [sources],” describes Garcia. Without intricate access control, low-code tools could easily suffer from data overexposure.

Citizen developers will likely not possess a deep understanding of how technology integrates with different data sources. Without security training, they may leave data publicly accessible or forget to enable logins for generated end applications.

As with any new technology, low-code platforms introduce a certain level of risk. “When a company is storing information for you, there is an inherent risk that that copy of information is only being secured by that provider,” said Garcia. It’s the low-code platform’s prerogative to follow good security practices around data connection, using OAuth and secure sign-on. However, this can’t always be enforced. The provider may have undocumented points of failure, such as broken API integrations or dependencies with zero-day exploits.

Tips to Retain Low-Code Security

Isolate your low-code environment from potential attack. The best way to avoid exposing sensitive data is to isolate, says Gacia. Thus, he sees many businesses operating in high-security areas opting to self-host their low-code platform. This could be done using on-premise servers or in a private cloud. 

Deploying inside a protected, self-hosted space is starting to become a bigger norm across industries. Of course, there is a trade-off here, as self-hosting requires increased maintenance and troubleshooting. Plus, it could alienate external support representatives who aren’t accustomed to your hosting architecture.

Follow the principle of least privilege. A core tenant for IT security is to only allow information access to those that need it. Low-code platforms may enable access to databases, compute power, integrations, and customer records. Such components should only be made available to trusted sources.

Choose a low-code tool with flexible access control capabilities. With application development, there are “a lot of layers of hierarchy you need to navigate,” says Garcia. Imagine a company with a set of internal professional developers, citizen developers, and external contractors and clients. All will have varying levels of authority. Thus, fine-grained Role-Based Access Control (RBAC) is required to enable read/write user settings, from the app groupings to the resources level.

Train citizen developers. “You really need to think about how to empower citizen developers to build on these tools, and to control the environment such that people don’t have unfettered access,” said Garcia. 

Treat low-code creations with the same security rigor as with typical app development. Hard-coded or low-coded, You’re building a software product. Just because things like build, compile, and integration are automated doesn’t mean you can forget about security. All software requires the same security standards.

Know where your data is. There’s a lot of nuance in how a low-code app will interact with data. The app could simply retrieve data, or it could have editing capabilities. The app could store data within the low-code platform or tap into an external database. If API keys are exposed, these integration points are highly vulnerable.

Understand your limitations and requirements when choosing a low-code platform. “There will always be inherent risk in moving data around with software,” says Garcia. “Know what your non-negotiables are and make them a requirement when searching for the right tool.”

Low Code Shouldn’t Mean High Risk

The interest in low-code is growing. Forbes forecasts that 75% of businesses will adopt low-code by 2024. They predict that by 2030, low-code development platforms will be responsible for $187 billion of revenue worldwide. 

Simultaneously, security is a ubiquitous problem. 43% of data breaches are tied to web application vulnerabilities, found a recent report. In the rush to adopt low-code, it’s imperative for organizations to consider the security implications of new tools. 

“There is risk everywhere,” reminds Garcia. It is beholden on the company to audit their development stack and the surrounding environment. As a response, infrastructure-focused tools are moving further and further toward private clouds, increased access control, and more opportunities to protect information, notes Garcia. With the proper security forethought, low-code adoption can be well-positioned to anticipate and respond to security vulnerabilities.

Share. Facebook Twitter LinkedIn Email
Bill Doerrfeld
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

Related Posts

Apps Apocalypse: Bill McDermott Joins Satya Nadella in Saying AI Agents Will Crush Applications

May 12, 2025

Bill McDermott Channels Satya Nadella: AI Agents Will Turn Apps Into CRUD

May 12, 2025

Larry Ellison Sees ‘Unimaginable’ AI Opportunity as Oracle Q2 RPO Jumps 50% to $97 Billion

December 10, 2024

Q3 Cloud Growth Previews: Salesforce 10%, Workday 18%, Snowflake 31%

November 18, 2024
Add A Comment

Comments are closed.

Recent Posts
  • C-Suite Perspective: What the AI-Powered Org Looks Like, Today and in The Future
  • AI Maturity Declines Year Over Year, But Leaders Push Ahead on Innovation, AI Skills
  • Microsoft’s Mission to Make Your Company AI First
  • Parisa Tabriz on Google Chrome Enterprise Security and AI Innovation | Cloud Wars Live
  • Snowflake Expands AI Data Cloud to Revolutionize Automotive Manufacturing and Data Integration

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.