Eat your (security) vegetables!

DALL-E was struggling to interpret this one 😅

I heard this phrase at the București Cybersecurity Conference 2024. Maybe it’s the (possibly slightly unusual) way my mind works, but it instantly made perfect sense to me, and now seems like an obvious thing to tell people.

So many projects only set their sights on the dessert: sweet tasty new features that make them look good. But that’s not a balanced diet. It requires neither a nutritionist nor a rocket scientist to tell you that this isn’t going to end well, especially in the long term.

  • Why do so many systems I see have so much technical debt?
  • Why are so many systems I see riddled with unfixed vulnerabilities?
  • Why are so many systems I see not patched up-to-date?
  • Why is the excuse I get so often along the lines of “we don’t have time to fix that” or “the new release must be out by ${date}” or similar?
  • Why have I found systems with vulnerabilities scoring CVSS > 9.0 that have been known about for MULTIPLE YEARS?

The answer, my friend, is blowin’ in the wind.

DALL-E imagines technical debt in the style of Pink Floyd’s The Wall

Eat your security vegetables. Make the time. Your system will be much healthier for it, even if some of the shiny new features take longer. In the long-term, your system will be easier to maintain and develop, so adding new features will be quicker anyway.

I’ve seen many projects where a good 10% of the development effort needs to be allocated to the security vegetables. These are systems in reasonably good shape. But they won’t stay that way without care.

Others need, for the time it takes to get them into reasonably good shape, at least 25% or more of the effort allocated for this. Avoid having to have THIS conversation with senior managers by making sure that the technical debt is not allowed to build up in the first place.

Eat your security vegetables. That’s it.

3 responses to “Eat your (security) vegetables!”

  1. Long time, buddy. Great article completely agree. It’s particularly tricky in an Agile world where maximising business value at each sprint is the main criteria for prioritisation. Eating the security sprout defect very rarely ranks up there with delivering the next bit of business functionality (I’m perhaps taking the analogy too far).

    Just one point though, you did missing the opportunity to capitalise on the Pink Floyd Another Brick in the Wall Part 2 lyrics: “If you don’t eat yer meat, you can’t have any pudding. How can you
    have any pudding if you don’t eat yer meat?”

    Ade

    Like

Leave a reply to Robert Baskerville Cancel reply