Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Cloud security should never be a developer issue

By Shira Shamban
DevOps-freepik
July 14, 2021

I dare to say this: “companies need to stop playing the game of pin the blame on the developer whenever a security vulnerability is discovered or exploited in applications.” Rather than pointing fingers at developers, organizations need to empower these professionals to help them build and expand their cloud-based initiatives without having to worry about security.

For sure, cloud security is an area of concern for many businesses. And as research firm Gartner has reported, much of the security problem is brought on by the companies that are using cloud services. The challenge exists not in the security of the cloud itself, the firm notes, but in the policies and technologies for security and control of the technology.

In nearly all cases, Gartner says, it is the user, not the cloud provider, who fails to manage the controls needed to protect an organization’s data. The firm predicts that through 2025, 99% of cloud security failures will be the cloud service customer’s fault.

Despite the ongoing risk of security failures in the cloud, organizations can not treat cloud security as a task that should be randomly dropped on software developers. Making unreasonable demands of developers—or worse, blaming them for security shortfalls—is counterproductive and can lead to resentment and low morale.

For that matter, educating developers about security issues might not be the best long-term solution either. Threats are constantly changing, and developers have enough on their plates already, learning new coding techniques, languages, frameworks, etc.

Developers are people who like to write code, create algorithms, and solve problems. Talking about code security and application security is not new, but it is definitely becoming more mainstream. Sometimes it’s required due to the emergence of new data security or data privacy regulations, or because of headline news about hacker attacks and data breaches.

The more we create cloud-native applications, the more developers are being forced to deliver more than just code. The rise of cloud-native applications means developers are expected to perform infrastructure and security tasks, as well as standard coding.

The problem is, most developers are not equipped to take on these additional tasks. They were probably not trained in a formal way to handle such responsibilities, and, as a result, they just go through the motions with the aim of seeing that their application runs smoothly and doesn't break anything else.

Unfortunately, we can't always double-check everything developers do. If they passed all the automated or manual tests, and made it safely through the continuous integration/continuous delivery (CI/CD) process, their code will end up in production—even if it’s using insecure infrastructure.

All of this is not the fault of the developers, given that we never taught them how to do security. We also can't blame them for not getting security right, when we typically measure their performance by closing tickets, finishing the sprint, or deploying the next feature. We simply didn't provide them with the right resources in order for them to get better at safeguarding applications.

A better solution to the challenges of providing security for cloud-based applications is to equip developers with the right tools, so that security basically becomes a non-issue. We have the ability to create good automation tools for security, so that potential threats and vulnerabilities do not stop or slow organizations down as they move faster and faster toward cloud deployments.

Such tools ideally would be integrated with existing workflows rather than trying to change them, and address security challenges by creating and maintaining a least-privilege security policy for cloud native applications. They would analyze cloud assets and monitor for conditions such as misconfigurations, excessive permissions, administrative privileges, and third-party access, all with the goal of automatically and continuously enhancing data and application security by creating granular policies.

By automating a number of processes, we can eliminate the need for developers to make multiple decisions and conduct multiple procedures related to security. In many cases, automating these efforts results in better, faster, and more accurate decisions, and it can be performed at scale.

With machines handling many of the cybersecurity responsibilities, developers are then free to do what they do best: create innovative software that adds value to the business and its customers.

This sort of automated solution to making cloud-based applications more secure will become increasingly important as more organizations move workloads into the cloud. In an October 2020 report, research firm International Data Corp. (IDC) said the Covid-19 pandemic has largely proven to be an accelerator of cloud adoption and extension, and will continue to drive a faster conversion to cloud-centric IT.

A key to success in this emerging cloud-focused environment will be ensuring strong security—without taxing the developers who are helping to create the cloud applications companies need.

 

KEYWORDS: cyber security information security risk management security management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Shira shamban
Shira Shamban, CEO and co-founder of Solvo, is a security researcher and technical expert with a focus on threat intelligence. She started her professional career in cybersecurity as a Military Officer in the elite intelligence unit 8200 of the Israel Defense Force. During her 13-year service in the unit, Shamban acquired hands-on experience in cybersecurity and intelligence operations while earning an engineering degree from Tel-Aviv University. After her military service, Shamban turned to security innovation in business. She volunteers as a Lecturer and a Mentor in forums such as SheCodes and OWASP-WIA.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • video-conference-freepik006785.jpg

    Standardizing video conferencing security guidelines should be a top government priority

    See More
  • global-enews

    Why Your Next Intelligence Analyst Should Be a Workplace Violence Analyst

    See More
  • coronavirus

    What Security Companies Should be Aware of When Navigating a Pandemic

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing