CI/CD Security: Shifting Left Without Overwhelming Engineers
Shift-left is right; shift-too-far-left is engineer burnout. The four checks that earn their CI place.
What shift-left should mean
Shift-left: catch security issues earlier in the SDLC, not later. Goal: developer feedback in minutes; not security report in months.
The trap: piling every scanner into CI. The pipeline slows; developers learn to skip; coverage drops.
Four CI security checks
- 1. Secret detection (gitleaks).
- 2. SBOM + reachable CVE scan (Trivy + reachability).
- 3. IaC misconfig scan (Checkov, KICS).
- 4. Container image scan (Trivy, Grype).
False-positive discipline
Each scanner has a tunable allowlist. Document the allowlist; review quarterly.
Block on critical-reachable findings; warn on others; never page on warnings.
Shift-right complement
Runtime tools (Falco, Tetragon) catch what static scans miss, behaviour at runtime that did not exist in code.
Both layers; complementary; not a substitute for shift-left.
Antipatterns
- 10 scanners in CI. Pipeline becomes the bottleneck.
- Every finding blocks the merge. Engineers find workarounds.
- Shift-left only. Misses runtime threats.
What to do this week
Three moves. (1) Apply this to one pipeline first. (2) Measure deploy frequency / MTTR before/after. (3) Document the outcome so the next team starts from data.