Reconciling security to the left and Zero Trust
Security to the left and Zero Trust are the buzzwords du jour in cybersecurity. These buzzwords – or buzz phrases if you will–most certainly will fade into obscurity, but the practices they represent will continue to be best practices for years to come.
Security to the left looks at the process of building and delivering software as a linear flowchart that reads left to right. That chart would look something like this:
Figure 7.1: Simple app development workflow
In this very simplified example, a developer writes code that is then placed in source control and ultimately comes out as an application for consumption by users. Looking at this security workflow on the right side, at the application layer itself, is important but too late. There are already three other obvious places where a lack of security can create vulnerabilities that could be exploited.
Solving security at the personnel...