Skip to content

Developers Hate Stop Signs, Not Security

Ali Mesdaq 3 Min Read
Developers Hate Stop Signs, Not Security

How’s the relationship between your engineering and security teams? If things could be better (maybe a lot better), you’re not alone.

Why do so many developers have an almost reflexive antagonism toward security alerts? Here’s some food for thought:

  • A typical software organization with an AppSec team must respond to approximately 120,000 security alerts every year.
  • 86% of DevSecOps respondents in a recent survey said security negatively impacts development speed.
  • 91% of developers get security training, but 70% of development teams skip security steps.
  • Only 29% of developers prioritize writing vulnerability-free code.

Developers get bonuses and promotions when they’re productive—and security alerts are a roadblock. When you’re trying to win a race, it’s hard to love a stop sign.

The Priority Tug-of-War

Speaking with developers about the issue, I’ve come to realize that a huge amount of the resentment toward security practitioners and alerts has to do with fundamental imbalances between security and engineering departments.

A major security flaw could be the most important item on your to-do list (because you’ll be the one dealing with the fallout if there’s a breach), but to the developer responsible for writing the code, fixing it feels like an annoying and unwelcome housekeeping task.

That’s one part of the imbalance: priorities and consequences.

Then there’s the skewed amount of effort required from each stakeholder. From security’s perspective, triaging the issue and sending it to the right developer may take only moments. In many cases, these alerts are totally automated. The developer, on the other hand, may need to work for hours to implement a fix.

So if it’s security’s priority—and security’s neck on the line if something goes wrong—why are the developers the ones spending all their time on fixes? On the security team, of course, we know many answers to that question (starting with: there’s 100x more developers than there are security guys, and we don’t know their code the way they do!). But these arguments fall on deaf ears.

What if developers deprioritize security because it just feels unfair?

Level the Playing Field With Automated Fixes

As a result of the fundamental imbalances I’ve described above, security and engineering departments both feel resentful—and everyone’s convinced they’re getting the worst end of the deal. Security feels like developers ignore alerts and don’t understand why security controls are important, while developers see security as a nuisance that doesn’t understand why developer productivity is important.

Now, let’s really think big: what if you could bring balance to this broken state of affairs?

That’s what automating fixes is all about. If it takes developers only a few moments to fix their code, security no longer needs to ask them to spend hours on remediation. Instead, you can get into a groove of super-fast fix cycles that make developer teams happier, more productive, and much less likely to ignore the next alert they see.

As AI-based tooling accelerates fixes, the developer side of the AppSec equation can finally benefit from security tools that lessen their work rather than add to it — and that’s something everyone can celebrate.

Subscribe to Amplify Weekly Blog Roundup

Subscribe Here!

See What Experts Are Saying

BOOK A DEMO arrow-btn-white
By far the biggest and most important problem in AppSec today is vulnerability remediation. Amplify Security’s technology automatically fixes vulnerable code for developers at scale is the solution we’ve been waiting decades for.
strike-read jeremiah-grossman-01

Jeremiah Grossman

Founder | Investor | Advisor
As a security company we need to be secure, Amplify helped us achieve that without slowing down our developers
seclytic-logo-1 Saeed Abu-Nimeh, Founder @ SecLytics

Saeed Abu-Nimeh

CEO and Founder @ SecLytics
Amplify is working on making it easier to empower developers to fix security issues, that is a problem worth working on.
Kathy Wang

Kathy Wang

CISO | Investor | Advisor
If you want all your developers to be secure, then you need to secure the code for them. That's why I believe in Amplify's mission
strike-read Alex Lanstein

Alex Lanstein

Chief Evangelist @ StrikeReady

Frequently
Asked Questions

What is vulnerability management, and why is it important?

Vulnerability management is a systematic approach to managing security risks in software and systems by prioritizing risks, defining clear paths to remediation, and ultimately preventing and reducing software risks over time.

Why is vulnerability management important?

Without a sound vulnerability management program, organizations often face a backlog of undifferentiated security alerts, leading to inefficient use of resources and oversight of critical software risks.

What makes vulnerability management extremely challenging in today’s high-growth environment?

Vulnerability management faces challenges from the complexity and dynamism of software environments, often leading to an overwhelming number of security findings, rapid technological advancements, and limited resources to thoroughly explore appropriate solutions.

How can Amplify help me with vulnerability management?

Amplify automates repetitive and time-consuming tasks in vulnerability management, such as risk prioritization, context enrichment, and providing remediations for security findings from static (SAST) application security tools.

What technology does the Amplify platform integrate with?

Amplify integrates with hosted code repositories such as GitHub or GitLab, as well as various security tools.

Have a
Questions?

Contact Us arrow-btn-white

Ready to
Get started?

Book A GUIDED DEMO arrow-purple