SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Secure development without barriers: How to build an SSDLC that actually works

Secure development without barriers: How to build an SSDLC that actually works
03.07.2025

Gainullina Ekaterina, Security Vision


Introduction


This year I was able to speak at PHDays Fest 2025 and today I want to share brief summaries from my report.


As incidents involving application vulnerabilities increase, companies are rethinking their processes and looking for tools that enable them to build truly secure products. But why is it that implementing secure development processes (SSDLC) is so often a formality, resulting in only a semblance of security?


From one-off audits to a real process


The traditional approach to security often boils down to one-off audits: every six months the product is tested for vulnerabilities, an impressive report is generated, and the process is considered complete. In practice, such a format rarely leads to increased security. The reason is that security is perceived as an event, and not as a constant property of the development process.


Organizations, introducing numerous regulations and checklists, hope to close the risks, but they encounter resistance from the team. Processes that interfere with work are bypassed or formally performed for the sake of appearances. True security is achieved when it is built into the daily development flow and is not perceived as external control. This requires a change of emphasis - from bureaucracy to the integration of security at all stages of the product life cycle.


Why Development and Security Speak Different Languages


At the root of many failures is a disconnect between three key parties: developers, businesses, and security. Each has its own optics. Developers are focused on speed and releasing new features, businesses are focused on profits and deadlines, and security is focused on minimizing risks and complying with policies.


Without a common context and dialogue, security processes are perceived as an obstacle: the business sees security as a drag, developers see security as bureaucrats, and security feels under-authorized. All of this fuels conflict, resulting in formal SSDLC failing to deliver real results.


SSDLC: Beautiful Theory, Harsh Practice


Most companies, in theory, declare the implementation of SSDLC: they prescribe security steps at all stages of development, include threat analysis, code reviews, and penetration tests. In practice, the process often starts too late - security is included only at the end of the project, when the main decisions have already been made and the product is almost ready.


As a result, teams are faced with a sudden influx of security requirements and bugs, often when deadlines are tight and all attention is focused on the release. Security reports become a "check mark", and the vulnerabilities found become unresolved problems that no one is in a hurry to fix. A formal approach leads to an illusion of control instead of a real result.


Checklists and policies are no guarantee of safety


Many organizations rely on checklists and detailed policies, believing them to be sufficient tools for ensuring security. However, even the most detailed regulations will not protect against errors if they are not integrated into the team’s actual work. Formal control creates a false sense of security: a developer can sign off on the readiness, go through all the points, but miss a critical vulnerability simply because he did not receive timely feedback at the time of writing the code.


Security is not a set of formal requirements, but a living part of the development culture. Checklists should not be just a bureaucratic procedure, but a useful hint that helps to avoid mistakes where it really matters.


PDF instead of dialogue: a waste of time and trust


One of the main problems is the lack of prompt two-way communication between security specialists and developers. Instead of a live dialogue, teams exchange heavy PDF reports that arrive very late. Developers, receiving such reports, are already thinking about other tasks and often do not understand the essence of the problems or are not ready to return to the old code. The result is delayed fixes, decreased motivation and deterioration in the quality of work.

 

Late = expensive


рис 1.png


The later a vulnerability is detected, the higher the cost of fixing it. An error found before a release can stop a product launch, cause an emergency, and cause major financial losses. Teams are forced to urgently redo already tested functionality, postpone releases, and disrupt business plans. Trying to speed up work, companies often put security on the back burner, ultimately risking losing much more — both money and reputation.


Why processes don't take hold


When security is introduced as an external and inconvenient process, teams start looking for ways to bypass it. Anything that breaks the usual flow of work causes resistance: checks are performed formally or ignored, vulnerability search turns into another routine duty. The only way to make security effective is to integrate it into the team’s usual tools and processes, to make it part of the daily routine, and not an externally imposed duty.


Security is not a check, but an escort


The modern approach requires rethinking the role of security: from an external controller, it should become a mentor and partner who accompanies the team at every stage. Like the autosave function in a text editor, security should be invisible, but constantly support the workflow and protect against critical errors.


The Four Principles of SSDLC Without Barriers


There are four principles that are important to building a working secure development process:

   1. Clarity: clear and transparent requirements, no “magic” or unclear instructions.

   2. Context: Advice and feedback are given in relation to specific tasks and code.

   3. Automation: Anything that can be automated should be automated to avoid overloading people with manual work.

   4. Invisibility: Security processes are built into the usual work steps so as not to interfere with developers, but to support them unnoticed.


Integrating security where your team works


Security should be built into familiar tools - GitHub , Jira , IDE. For example, code analysis results should appear directly in pull request's, and security tickets are automatically sent to the task tracker. This approach allows the team to respond to problems in a timely manner and fix them during the process, rather than at the end of development.


Useful feedback - concrete actions


рис 2.png


Feedback on security should be clear and actionable — not just "there is a bug", but what and how needs to be fixed. Ideally, such a recommendation automatically turns into a task in the project management system. This reduces the time of correction and reduces stress for the team.


When a team becomes a single thread


The main effect of built-in security is the disappearance of "walls" between developers, testers and security specialists . Instead of separate stages, a single flow appears: security issues are resolved where the task arises, and are not postponed until the final audit.


Dream Platform: Security at Every Stage


The ideal SSDLC is continuous support at all stages: from the idea and architecture, through code and CI/CD, to release and support. Security becomes part of the requirements, architectural decisions, code, automated tests, production settings, and even post- release monitoring. This approach does not require much effort for integration - the processes simply work in the background and help the team not stumble over old bugs.


Why it is necessary to implement it now


рис 3.png


The world is accelerating, and you can't delay security. Some facts: after a new vulnerability is discovered, it takes attackers about 24 hours to develop an exploit. Imagine: news about a bug comes out, and the next day scripts are roaming the network looking for vulnerable systems. If your vulnerability fixing process takes a week, a month, a quarter, you simply won't have time.


The Russian regulator, FSTEC, generally says in its recommendations: critical vulnerabilities must be eliminated on the same day they are identified. In some industries, this is a strict requirement. And this is logical: when every hour counts, security must respond immediately.


This is where the now fashionable slogan "Shift security left" came from - shifting security to the left, that is, to the early stages. But I want to emphasize: “security to the left” is not just a trend, it is an inevitability. It is a response to the real situation: if you drag security to the end of the cycle, you are at a loss. Ideally, as we discussed, it should go hand in hand with development from the very beginning.


Real-life examples: the cost of mistakes


Stories of billions in losses due to security process errors are not uncommon. Examples from the industry (Ariane 5, CrowdStrike, etc.) show that the lack of a well-established process leads to disasters that could have been avoided by investing in a security culture in advance.


What does barrier-free SSDLC look like in practice?


рис 4.png


During the development process, safe behavior must be formed at every stage:

  • Already at the idea stage, not only features but also threats are discussed.

  • Architectural decisions are made taking into account risks and trust boundaries.

  • When writing code, analyzers, linters, and safe practices are used.

  • The CI/CD pipeline automatically runs tests, scanners, and dependency checks.

  • Final settings and quality control before release.

  • After the release - regular monitoring, analysis of new vulnerabilities and prompt response to incidents.


It's all one process where safety is built in and perceived as part of the team's DNA, not an external requirement.


Results: Why does business need this?


The main benefits of the approach:

  • Bring new products to market faster and more safely.

  • Less conflicts and "surprises" before release.

  • Real risk reduction, transparency and control.

  • Saving resources and increasing trust within the team.


Getting Started: Five Easy Steps


рис 5.png


   1. Implement at least one automated check in CI/CD.

   2. Provide security feedback directly in the pull request's.

   3. Conduct joint architectural sessions with security and development teams.

   4 Link detected threats and recommendations to tasks in a common tracker.

   5. Measure the speed of response to vulnerabilities, not just their number.


Each of these steps does not require huge resources, but it starts the process of change.

 

SSDLC Formula: Clarity, Flow, Trust


рис 6.png


Working secure development is a combination of three things: process clarity, a single workflow, and trust between all participants. If you can implement these, security ceases to be a barrier and becomes a support for the business, giving the team confidence and freedom to grow.


Secure development without barriers is a reality if you take it step by step, starting with simple changes and making security a natural part of your daily work.