Stop Shifting Left
Jan 5, 2025

Stop Shifting Left
For years, the mantra of “shift left” has dominated discussions about application security. The concept, at its core, is simple yet powerful: integrate security earlier in the Software Development Life Cycle (SDLC). By addressing vulnerabilities during design, development, and testing phases, organizations can save time, reduce costs, and build more secure applications.
But while “shift left” has undeniably been a step in the right direction, it’s time for a broader, more encompassing approach. Security shouldn’t just be an early consideration; it should be a constant consideration. We need to stop thinking about shifting left and instead embrace the idea of shifting everywhere.
The Limits of Shifting Left
The focus on shifting left assumes that security concerns begin and end within the SDLC. While critical, the SDLC is only one part of an organization’s broader operational landscape. Security vulnerabilities don’t just originate from code—they can stem from how applications are deployed, how teams manage sensitive data, and even how third-party integrations are handled.
For example:
A perfectly secure application built with “shift left” principles can still be compromised due to misconfigurations in deployment pipelines.
Sensitive data might be left exposed due to improper access controls in unrelated business processes.
Supply chain risks can creep in after the code has been shipped, through insecure dependencies or compromised third-party services.
Shifting left addresses some vulnerabilities, but it doesn’t account for security challenges that exist before the SDLC begins or after the software is live.
Why We Need to Shift Everywhere
To build truly secure systems, we must take a step back and zoom out. Security isn’t just about the SDLC; it’s about understanding and mitigating risks across all phases of the business. This is where the concept of “shift everywhere” comes into play.
Here’s what shifting everywhere looks like:
Security in Business Strategy
Security needs a seat at the table when business decisions are being made. New product ideas, market expansions, and third-party partnerships should all include security risk assessments as part of their planning processes.
Security in Supply Chain Management
The rise of supply chain attacks highlights the need for robust vendor and dependency management. Security teams should evaluate third-party risks and monitor software supply chains for vulnerabilities or compromises.
Security in Deployment and Operations
The DevOps movement brought speed and agility to software development, but it also introduced new risks. Security practices like Infrastructure as Code (IaC) scanning, runtime protection, and continuous monitoring must be woven into deployment and operational workflows.
Security in Customer and Employee Interactions
Applications don’t exist in a vacuum. They are used by people—customers and employees—who can introduce risks through phishing attacks, poor password hygiene, or other human factors. A comprehensive security program includes education, awareness, and tools to mitigate these risks.
Security in Incident Response
Shifting everywhere also means planning for failure. Despite the best efforts, vulnerabilities and breaches can still occur. Organizations need mature incident response processes that prioritize fast containment, mitigation, and root cause analysis.
Zooming Out on Security
Shifting everywhere requires us to zoom out and see the bigger picture. Security isn’t a phase; it’s a lens through which we should view every aspect of an organization. By adopting this mindset, we can:
Break down silos between security, development, operations, and other business units.
Foster a culture of shared responsibility, where everyone—from developers to executives—understands their role in protecting the organization.
Build systems and processes that are resilient, not just secure in theory.
A Call to Action
The security challenges we face today are more complex than ever, and the solutions require a shift in how we think about security itself. It’s time to stop shifting left and start shifting everywhere.
Security professionals, developers, and business leaders alike must collaborate to weave security into the fabric of everything they do. Only then can we build systems that are not only secure during development but resilient throughout their entire lifecycle.
Ready to Shift Everywhere?
Explore how SkaSec can help you protect your software, repositories, and supply chain security from development to deployment. Start a free trial
#CyberSecurity #DevSecOps #ShiftLeft #SDLC #SupplyChainSecurity #InfoSec #DevOps #ApplicationSecurity #ShiftingEverywhere #SupplyChainSecurity #DevSecOps #CyberResilience #SecureSDLC
Secure your code with lightning-fast, affordable SCA, comprehensive SBOM, and GitHub Checks, all seamlessly integrated with your workflow
West Jordan, Utah