Shifting Left
Compliance and Policies
Application Security in Non-Ultimate Tiers
Identified Pains
Why Now?
100

This view allows me to review vulnerabilities before pushing to production and reducing risk

What is the Merge Request?

100

This check requires a security team member to approve the merge request to prevent vulnerabilities from merging in.

What is security approval rules?

100

This scanning tool identifies committed keys in the repository such as AWS or personal tokens.

What is Secret Detection?

100

The long list of tools I have will not allow me to scale out successfully.

What is Toolchain Tax?

100

An organization may be up at the end of their contract with another security tool.

What is a Renewal?

200

It costs this much to remediate after production

What is 30X?

200

As an organization, I have to check certain dependencies to minimize legal ramifications.

What is License Compliance?

200

This scanning tool inspects the source code for weaknesses such as memory issues or bad function calls.

What is SAST?

200

 I'm "too far in which direction" if I'm scanning after production.

What is "Too far Right"?

200

An organization has realized they are managing three different security tools and costs have spun out of control.

What is a Consolidation Effort?

300

This type of loop in the merge request saves me time and reduces security risk.

What is having "immediate feedback"?

300

This makes it easier to apply security scans across an organization without setup friction

What is security execution policies?

300

This scanning tool can determine security misconfigurations with my cloud settings such as AWS.

What is Infrastructure as Code Scanning?

300

I'm not sure which applications are vulnerable or I have to check multiple places

What is "Lack of Visibility"?

300

A startup has no security procedures and recently hired a security lead to implement a better security posture.

What is a New Security Initiative?

400

These two roles have been traditionally silo'd when delivering applications.

What is the "developer" and "security engineer"?

400

Developers may try to override their pipeline. The DevOps engineer who oversees testing and deployment will use this type of pipeline to prevent this?

What is compliance pipelines?

400

This type of text file stores security scanning results and is not human friendly to read and is the only way to view results in non-Ultimate tiers.

What is a JSON report?

400

The developer can be overburden with many screens and tools to review.

What is "Context Switching"?
400

An organization is trying to obtain a new customer and must follow specific procedures.

What is Compliance Requirements?

M
e
n
u