29 March 2020

Delio Tech: Secure by design - shifting security left

Written By James Elliott in Technology

Delio Tech: Secure by design - shifting security left

Security is an essential and critical part of any product development process. Due to the continually shifting nature of security, it should be high on every business's agenda. It seems almost every day in the media we’re reading about a new vulnerability found within a piece of software that was previously thought to be secure, or a new data breach coming from a large company.

A common approach to security with code is to push it far down the pipeline to the Information Security (InfoSec) team, where they would test the application for any security issues and compliance. As can be seen in the diagram below, such testing can require hours and hours of input from Developers and Testers through to DevOps Engineers and the InfoSec team itself. 

 

The image highlights what used to be Delio’s traditional approach of checking security shortly before deployment. This old approach is further highlighted below and has now been replaced.

  1. A Developer takes a week to write a snippet of code
  2. They deploy the code to the staging server via the pipelines where the code gets tested
  3. Once completely approved and tested, the code is then sent to a demo server where testers review the code again
  4. The code is about to be released
  5. Hold on! InfoSec takes a look, and it’s bad news. The underlying open source component, which your code relies on, is insecure and cannot be used
  6. The Developer has to rewrite their code and begins Step 1 again

 

Not only is this process time-consuming, but because it requires much effort, it impacts team morale. Because of this, Delio decided to take a different approach: shifting the security check ‘to the left’ during development. 

 

Boosting morale with a more efficient security check approach

Security checking ‘to the left’ is essentially the process of moving these checks to the start of the development cycle. It reviews whether code is secure from the get-go rather than waiting until the end, where the risk of securely rewriting large amounts of code is high.

It all starts with the right tools. We use several tools to help us check whether the code appears to be correct (using static code analysis) and check our open source dependencies for vulnerabilities against a database of Common Vulnerabilities and Exposures (CVE). This whole process by design is integrated into our CI* pipelines. On each push to our source code control repository, the pipeline can be checked alongside our tests. By adapting our pipeline, we have been able to make deployments more efficient.

Placing security checking & compliance ‘to the left’ comes with its speed penalties. However, you can easily overcome such penalties by running multiple pipelines in tandem. At Delio, for example, we now run our tests, our static code analysis and our open source vulnerability tool all at the same time. It’s also quicker to fix issues as they present, rather than much later down the pipeline when the developer has moved onto other work and then has to ‘task switch’ back to the original work. 

 

The benefits

For us, here at Delio, it means we’re saving precious development time. Also, more importantly, we’re instilling secure development practices from the start of the work, which is recommended as nobody wants to ship insecure code. Besides making the team manage workflow more efficiently, it is helping Developers understand security from the get-go. The team is being upskilled and more aware of the impact their code can have in terms of security. As a result, we’re shipping new features quicker and more securely to our clients’ platforms. 

With all of these pipelines running our tools and processes, you significantly diminish the chances of running vulnerable code in production. Nobody can ever be 100% positive whether a piece of code is vulnerable or not, but that is why strengthening the security process while making it more time-efficient, is a continuous operation. 

 

Where next?

The next part of the puzzle is having your pipelines set correctly, as it can help shorten your security analysis. Robust CI/CD* pipelines mean that an Open-Source Dependencies Check can be more easily integrated into the pipeline. Just remember to block the pipeline if your security scan fails. For example, here at Delio, we block it until we have fixed any vulnerabilities, so no further code is added until it passes all pipeline automated tests.

Despite all of this, wouldn’t it be even better if we could review the code security in real-time? This process is one of the things we are currently reviewing. Adding these tools directly into the Integrated Development Environment (IDE), allows Developers to check for security while writing their code in real-time. Whether there is a problem with the written code or whether one of the open-source dependencies is on the CVE database, these instabilities can be flagged instantly. In doing so, Developers can save a considerable amount of back-and-forth checking. By turning security into a continuous process, businesses can drive their technology to the next level.


*CI/CD: Continuous Integration/Continuous Deployment. This pipeline automates the development, testing and deployment of code.

Up Next ...
22 November 2024

Eden AI raises €3M seed round to bridge the gap between AI models and business needs

Eden AI, which works with more than 500 organisations including the Council of Europe and Atos, translates sophisticated AI models into practical tools for businesses...

22 November 2024

City Bank Adopts TranzAxis for E-Commerce Payment Solutions

This decision aligns with the bank’s focus on digital transformation and improving online transaction processes for merchants.

22 November 2024

Zellis summit maps bold future of innovation

Event showcases Zellis HCM AIR, realtime payroll, and AI-enhanced features

21 November 2024

Nubank Explores Legal Domicile Shift to the UK Amid Regulatory Changes

The decision, reportedly under discussion with the UK government, aligns with the UK’s efforts to attract global tech firms

More in Technology

Commerzbank builds GenAI-powered virtual assistant

28 November 2023

Commerzbank is working with Microsoft to use generative AI and ...

Tech South West launches Angel Investor Programme

31 October 2023

A new Angel Investor Programme launching in the Great South ...

BBVA consolidates tech firms into one new company

23 October 2023

BBVA is combining its three tech firms into one new ...

Tech Nation returns with £10bn funding pledge

17 October 2023

Tech Nation is back with the help of Founders Forum ...

Articles Technology

From AI compliance to competitive advantage

02 October 2023

Key message:As companies deploy AI for a growing range of tasks, adhering to laws, regulations and e...

White Papers Technology

e-HKD: A technical perspective

19 May 2022

This whitepaper is part of the technology experimentation study under Project e-HKD. It explores pot...

Articles Technology

Across Fjord Trends 2021 - mapping out the new territory

04 May 2021

With the events of 2020 upending so much of what we took for granted, we now need to look ahead with...

Articles Technology

Technology Futures 2021 - Report by Deloitte

22 April 2021

The World Economic Forum and Deloitte present this first-of-its-kind report, equipping today’s reade...

There are no Events in this category