Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Shifting left isn't always right

By Rickard Carlsson
code

Image from Unsplash

December 2, 2022

The Shift Left movement has been a hot topic for a number of years. Building security into the development cycle as early as possible helps create fast feedback loops and accountability in development teams, reducing organizational risk by helping DevSecOps teams build more secure code. For a while, shifting left was the obvious thing for IT teams to do, since the historical model with a final "security gate" before release into production no longer works for a number of organizations.

But is the Shift Left movement a “silver bullet?” No, and it should not be treated as such.

Shifting left has its merits, but this approach has a fundamental problem; not all vulnerabilities will be found in staging environments. Many types of risk can only be found in the production environment, in part because the configuration for staging and production is never the same. Putting all an organization’s eggs in the Shift Left basket is foolhardy because trying to catch everything early is not only costly, but difficult to achieve.

A failure in shifting left

Because IT teams cannot catch everything by shifting left, organizations need other plans and tools for catching the vulnerabilities that do make it onto the attack surface. There are certain threats that only continuous testing in production will actually identify, such as subdomain takeovers. Shifting left does nothing to prevent subdomain takeovers because a subdomain takeover involves a CNAME pointing to a service that's no longer active. No matter how often security teams are testing pre-production, they are likely not testing assets that they do not even know about. Not every company will struggle with subdomain takeovers specifically, but many companies have hidden vulnerabilities that cannot be addressed just by shifting left.

Better patch management will not fix the problem

Patch management is also a critical component of an organization’s security strategy, but patch management is over-reliant on public disclosure processes like CVEs. CVEs only cover a fraction of the risks that occur in the modern technology stack, so just running a vulnerability management software will only take cybersecurity so far. And even with effective patch management, there’s no shortage of new CVE discoveries yearly, many AppSec vulnerabilities are never reported, and most of the stack is not covered by CVEs. This leaves organizations doubly exposed. To defend the organization, cybersecurity teams need a plan to understand if and where their environment is at risk and whether it's from publicly disclosed vulnerabilities.

How can CISOs protect what they don’t know they have?

One of the modern CISO’s biggest pain points is an overall lack of transparency — it’s hard to defend something IT didn’t know they had/doesn’t have access to. With companies embracing digital transformation and accelerating cloud migration projects, they are creating incredibly complex, interconnected environments with thousands of subdomains. The only way to manage this risk is by continuously discovering, inventorying and testing a company's external attack surface. This approach helps cybersecurity teams gain an attacker's view of the enterprise environment, eliminating blind spots and enabling the swift prioritization and remediation of any issues.

Look both ways to be safe

Shifting security left is required for effective DevSecOps. With the pace of development speeding up, organizations cannot only include security as a last-minute appendage to the development process. However, shifting left doesn't completely protect institutions as hackers probe companies’ rapidly expanding external attack surfaces. True DevSecOps requires shifting both left and right, testing in both staging and production environments continuously in real-time. Regardless of how well an organization shifts left, assuming that all vulnerabilities have been caught isn’t wise.

Companies need to look right using continuous testing to look for forgotten or exposed assets. Even if companies find 100% of the vulnerabilities in software development, without continuous testing to see if any back doors are open, malicious hackers will find a way in and try to take over the network.

KEYWORDS: application security Chief Information Security Officer (CISO) DevOps hacker patch management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rickard Carlsson is CEO and Co-Founder of Detectify.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cell phone

    Multi-factor authentication isn't always enough to stop cyber threats

    See More
  • Bomb Threat Response

    In Response to Mass Shootings, Increased Security Personnel Isn’t Always the Answer

    See More
  • Talk Isn’t Always Cheap

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing