visit
At SonarSource, we believe that developer-led Code Security will inevitably come to dominate the SAST market just like developer-led Code Quality did a decade ago. Finding Vulnerabilities immediately after they're introduced instead of weeks later just makes more sense. But what does that mean for the risk and compliance teams that lead those efforts today? Those jobs don't go away. Actually, they get more interesting and possibly even more important.
Today, security auditors really aren't in an enviable spot. First they're working with tools that take a no-news-is-good-news approach; tools that raise issues for anything even remotely suspicious. So Security auditors spend a significant chunk of their time on the drudge work of identifying the few things that really need action in a sea of false positives.Once they've done that, they can't actually fix the code themselves. Instead, they have to deliver the stale bad news to the folks who actually can - the developers - and convince them to switch focus from delivering business value to correcting code they haven't thought about in weeks.
It doesn't sound like a dream job, does it?
But with developer-led Code Security, things get better. First, if we raise a Vulnerability, you know there's something to fix. We put those Vulnerabilities front-and-center for developers, so they're handled while the code is still fresh in mind.
And because it's integrated into their workflow, developers will fix most Vulnerabilities and review Security Hotspots as a matter of course. That lets security auditors move out of the enforcer role. Instead of "You must fix this old code!", they can shift into collaboration and oversight.Previously published at