Are you working with agile technology that allows you to innovate faster? This is possible with composable architecture: a set of modular components, such as microservices, headless applications and APIs that can be easily developed and tailored to the specific requirements of your company. Composable architecture offers various advantages. Your data is more centralised, with reduced technical debt and dependency of IT platforms for updates and new releases. However, should your organisation go this route, you best be aware of the potential security and privacy risks. Are you curious about safely deploying IT to make your organisation more agile? Today, I share my experiences with you.
Alas, there is no standard solution for common security threats, as each problem has a different cause. A good thing, then, that we can look out for signs that there may be something wrong with security.
Perhaps you’ve seen this too: the focus during the development of new software or technology is mainly aimed at delivering visible features, while security tasks are not included in the sprint planning. Sometimes, a lot of time and money is spent on the development of a specific feature, while other aspects are all but ignored. Yes, the team delivered a good risk assessment – but it was ignored in the day-to-day practice.
You can prevent this by training security champions in your team. These colleagues can assist product owners and development teams with identifying risks and putting adequate measures in place.
When it comes to security, we all have a part to play. Surely, as a developer, product owner, programme manager or stakeholder, you’ve dealt with security issues, with your experiences colouring your feelings about the subject. Let's try something out. Which of the following applies to you?
A team's maturity regarding the topic of security makes a big difference. Do we have the expertise? Where are the gaps? What does the team need to make the right decisions and develop a secure product?
When you use a maturity model based on OWASP, OpenSAMM, BSIMM or another standard, you guide teams towards adopting the right practices and make your team more autonomous.
Every member of a project organisation has impact on the final outcome. With such a set-up, then, it is essential that security issues are identified and that security is perceived as an opportunity, not as a burden. People should have a solid understanding of the advantages of investing in security and security achievements should be celebrated.
This is what we call security by design and there is a range of tools that can help ensure security during every stage of a project. Any digital project benefits from threat modelling, where you start off with mapping the attack surface and identifying the risks.
Would you like to know more about the safe implementation of composable technology? Do you need a little help? Why not send me a message on LinkedIn or reach out to our team.
Let's connect and explore how we'd make your initiative more successful. What describes your situation best?