{"id":1263,"date":"2021-07-02T13:06:00","date_gmt":"2021-07-02T13:06:00","guid":{"rendered":"https:\/\/expleo.com\/global\/en\/?post_type=insight&#038;p=1263"},"modified":"2025-08-28T09:30:39","modified_gmt":"2025-08-28T09:30:39","slug":"asg-series-the-urgent-need-to-shift-left-security-testing","status":"publish","type":"insights","link":"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/","title":{"rendered":"ASG Series: The urgent need to shift-left security testing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1263\" class=\"elementor elementor-1263\" data-elementor-post-type=\"insights\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8522ec8 gg-article-content  gg-standard-article-template gg-simple-text  gg-container-small-ptb-72  elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8522ec8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-14e3885\" data-id=\"14e3885\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0a56300 gg-font-v9 gg-text-with-paddingbottom gg-class-for-iphone8 elementor-widget elementor-widget-text-editor\" data-id=\"0a56300\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Security testing is a complicated and expensive \u2013 but very necessary \u2013 stage of the software delivery cycle. With the growth of cloud-hosted applications and unprecedented home working due to the pandemic, has automated security testing in a DevOps pipeline matured enough to mitigate the real risks of cyberattack? The\u00a0<a href=\"https:\/\/www.bbc.com\/news\/business-57050690\" target=\"_blank\" rel=\"noreferrer noopener\">recent \u201cransomware\u201d breach on the Colonial oil pipeline in the US<\/a>\u00a0suggests not.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b59fbd gg-display-none-print elementor-widget elementor-widget-image\" data-id=\"7b59fbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/05\/cybersecurity_featured-1024x576.jpg\" class=\"attachment-large size-large wp-image-108860\" alt=\"A person\u2019s hand is using a laptop with digital security graphics overlaid, including a shield with a keyhole symbol, representing cybersecurity and data protection.\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/05\/cybersecurity_featured-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/05\/cybersecurity_featured-300x169.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/05\/cybersecurity_featured-768x432.jpg 768w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/05\/cybersecurity_featured.jpg 1280w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c5673d gg-font-v9 gg-text-with-paddingbottom gg-class-for-iphone8 gg-print-pb-10 elementor-widget elementor-widget-text-editor\" data-id=\"9c5673d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Historically, security testing has been a complex, largely manual and deeply technical discipline within software testing. It\u2019s typically an activity that is scheduled towards the end of a delivery cycle and often, when an application is deemed close to production readiness.<\/p><p>More and more organisations are adopting a DevOps approach to their development practice and moving to microservice architectures. We are therefore seeing more aggressive delivery times and smaller modules of work being delivered.<\/p><p>However, this increase in the velocity and variety of service releases brings an ever-increasing attack surface for malicious actors. It also creates impossibly-small time windows for executing comprehensive manual security checks. How do we mitigate these risks while still maintaining aggressive release velocity?<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fe5d0d gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"7fe5d0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Defence in depth<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4db0248 elementor-widget elementor-widget-text-editor\" data-id=\"4db0248\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The big players in the cloud space (Amazon AWS, Microsoft Azure, Google Cloud) are doing their bit to help. On the deployment side of the equation, they are providing multiple layers of protection \u2013 or \u201cdefence in depth\u201d. This is useful for building out a cloud-based infrastructure that\u2019s centred around the lowest level of permission paradigm, where access to resources must be explicitly granted. Other example protections include\u00a0<a href=\"https:\/\/dzone.com\/articles\/distinguishing-authn-and-authz\" target=\"_blank\" rel=\"noreferrer noopener\">AUTH-N\/AUTH-Z<\/a>\u00a0and the encryption of data at rest using server-side encryption (SSE) routines such as\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Advanced_Encryption_Standard\" target=\"_blank\" rel=\"noreferrer noopener\">AES-256.<\/a><\/p><p>This lowest level of permission paradigm means that complex applications that have large architectures (and also ones that don\u2019t) need to implement methods of communicating across cloud resources using Keys and access control lists (ACLs) etc. The larger the architecture, the larger the surface area for attack becomes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c71b96 gg-display-none-print elementor-widget elementor-widget-image\" data-id=\"1c71b96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/diagram-on-laptop-03-inpage-1024x576.jpg\" class=\"attachment-large size-large wp-image-1270\" alt=\"Men working in front of the computer\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/diagram-on-laptop-03-inpage-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/diagram-on-laptop-03-inpage-300x169.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/diagram-on-laptop-03-inpage-768x432.jpg 768w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/diagram-on-laptop-03-inpage.jpg 1280w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3533f6 elementor-widget elementor-widget-text-editor\" data-id=\"a3533f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unfortunately, the biggest risk of compromise to any application or company is the people who run it. Keys can accidentally be committed into source code repositories. Secure coding principles may not be clearly defined or adhered to. Time pressure on releases can cause many issues to go undetected in a manual security scan. Human fallibility is the recurring factor.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1234929 gg-font-v4 gg-custom-dark-purple-color gg-print-v2-pb-9 elementor-widget elementor-widget-heading\" data-id=\"1234929\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Easy access\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3dd238 elementor-widget elementor-widget-text-editor\" data-id=\"f3dd238\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Consider a web-based book-selling application with a subscription service that requires users to provide credit card details to join. The database is securely deployed into a private subnet, with an Access Control List allowing access to only certain source network addresses, as well as an AUTHN\/AUTHZ control for access and privilege protection. It would be natural to assume that these layers of cloud protection mean that the database is nice and safe and cannot be breached externally, right?<\/p><p>Alas, that is not the case. The users of the service must enter their card details to the website. Therefore, we can deduce, with a high degree of confidence, that the web page is in the ACL to the database. Already we have a publicly facing access route into the \u201csafe and secure\u201d database \u2013 provided a method of access can be found. The scary truth is that there are multiple methods to attack this database, including SQL Injection, Cross Site Scripting (XSS) etc. To an adept cybercriminal, it\u2019s an open door.<\/p><p>Bear in mind this is only one small part of what could be a much larger website with many, many vectors for attacking. How then, can we expect a manual security scan in a short time frame to adequately analyse and test all the possible attack vectors and expose them?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1964bed gg-font-v4 gg-custom-dark-purple-color gg-print-pb-1 elementor-widget elementor-widget-heading\" data-id=\"1964bed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability scanners<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29e0a38 gg-print-v2-pb-2 elementor-widget elementor-widget-text-editor\" data-id=\"29e0a38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The good news is that the security community is really beginning to step up in the tooling space. There are currently multiple tools on the market, both commercial off-the-shelf and open source, that come under the heading of vulnerability scanners. These tools promise to bring automation to the practice of scanning applications, networks, compute resources etc. for potential vulnerabilities.<\/p><p>Recently, I was engaged on a project for a web-based application where my client was interested in reducing the number of issues that were caught in their regular manual pen-testing cycle. Catching these issues earlier not only allows for them to be addressed faster, but it also reduces the costs associated. The further \u201cright\u201d in the cycle a defect is detected, the more expensive it becomes to address.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e90a41a gg-display-none-print elementor-widget elementor-widget-image\" data-id=\"e90a41a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage-1024x576.jpg\" class=\"attachment-large size-large wp-image-1271\" alt=\"Hand reaching to the icons on the board\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage-300x169.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage-768x432.jpg 768w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage.jpg 1280w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78d0dce elementor-widget elementor-widget-text-editor\" data-id=\"78d0dce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In short, how was this achieved? After a few days spent researching the tools landscape, I shortlisted several tools to be implemented into the development\u00a0<a href=\"https:\/\/circleci.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CircleCI<\/a>\u00a0pipeline that covered Dynamic Application Security Scanning (DAST), Static Application Security Scanning (SAST) and interactive passive scanning of the web application:<\/p><ul><li>GitHub\u2019s dependabot was implemented for flagging issues with either outdated or vulnerable third-party opensource libraries and automatically raising pull requests to address them.<\/li><li><a href=\"https:\/\/www.invicti.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Netsparker<\/a>\u00a0enterprise was easily implemented into the pipeline using the CircleCI orb provided from Netsparker to automatically invoke a DAST scan of the application once it had been deployed to the staging environment and executing active attack scans against the web application such as XSS Fuzzing, API Fuzzing etc.<\/li><li>The great folks over at\u00a0<a href=\"https:\/\/owasp.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">OWASP<\/a>\u00a0provide their Zed Attack Proxy (ZAP) utility in a regularly updated docker container that contains all of the latest known CWEs that can be scanned for. Leveraging the automated tests written using Selenium, it was incredibly straightforward to proxy all of the web application traffic through the ZAP proxy and generate a passive security report, in a well-formatted HTML for each page that the automation visited.<\/li><\/ul><p>With each of these tools implemented into the CI Pipeline, the scans run each time there is a code change to the code base. This provides the client with the confidence that vulnerabilities can be scanned for and raised in the bug-tracking system using the power of automation inside a DevOps pipeline.<\/p><p>As a final word, this does not remove the requirement for a dedicated security testing team. There is a difference in the roles that the automated scanning and a dedicated security team provide. Using the power of automation to quickly identify obvious vulnerabilities, the existing security team can spend their time assessing the risk to the business. How? By exploiting these vulnerabilities, crafting much more complex attacks, and keeping themselves up to date with the current best practices and any new issues that may be found in the wild that do not yet have automated checks in place.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db17e13 gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"db17e13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ready to help<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b308cf elementor-widget elementor-widget-text-editor\" data-id=\"9b308cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At Expleo we firmly believe in the value of automation in protecting systems and data. Visit Expleo\u2019s\u00a0<a href=\"https:\/\/expleo.com\/global\/en\/services\/digital-transformation\/\">Process Automation<\/a>\u00a0page for more information on our capabilities in this space.<\/p><p><strong>Andy Morrison, Solutions Architect of Advanced Solutions Group at Expleo Group.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Andy Morrison, Solutions Architect for ASG at Expleo Group discusses security testing in the second blog of the ASG Series.<\/p>\n","protected":false},"author":78,"featured_media":1271,"parent":0,"template":"","meta":{"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_angie_page":false,"footnotes":""},"topic":[212,151],"insights-single-templates":[316],"industry-taxonomy":[265],"content-type":[23],"country":[119],"service":[216,54,68,209,208,55,77,60,83],"class_list":["post-1263","insights","type-insights","status-publish","has-post-thumbnail","hentry","topic-data-science-and-cybersecurity","topic-quality-assurance-and-software-development","insights-single-templates-old-template","industry-taxonomy-aall-industries","content-type-blog","country-ireland","service-digital-transformation","service-software-quality-assurance","service-business-agility-and-lean","service-product-process-engineering","service-quality-testing","service-regulatory-compliance-management-for-manufacturing","service-cybersecurity","service-tech-enabled-business-processes","service-transformation-consultancy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Expleo | The urgent need to shift-left security testing<\/title>\n<meta name=\"description\" content=\"Andy Morrison, Solutions Architect for ASG at Expleo Group discusses security testing in the second blog of the ASG Series.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ASG Series: The urgent need to shift-left security testing\" \/>\n<meta property=\"og:description\" content=\"Andy Morrison, Solutions Architect for ASG at Expleo Group discusses security testing in the second blog of the ASG Series.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"Global EN\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-28T09:30:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/asg-series-the-urgent-need-to-shift-left-security-testing\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/asg-series-the-urgent-need-to-shift-left-security-testing\\\/\",\"name\":\"Expleo | The urgent need to shift-left security testing\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/asg-series-the-urgent-need-to-shift-left-security-testing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/asg-series-the-urgent-need-to-shift-left-security-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/cyber-security-02-inpage.jpg\",\"datePublished\":\"2021-07-02T13:06:00+00:00\",\"dateModified\":\"2025-08-28T09:30:39+00:00\",\"description\":\"Andy Morrison, Solutions Architect for ASG at Expleo Group discusses security testing in the second blog of the ASG Series.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/asg-series-the-urgent-need-to-shift-left-security-testing\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/asg-series-the-urgent-need-to-shift-left-security-testing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/asg-series-the-urgent-need-to-shift-left-security-testing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/cyber-security-02-inpage.jpg\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/cyber-security-02-inpage.jpg\",\"width\":1280,\"height\":720,\"caption\":\"Hand reaching to the icons on the board\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/asg-series-the-urgent-need-to-shift-left-security-testing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ASG Series: The urgent need to shift-left security testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\",\"name\":\"Expleo | EN\",\"description\":\"Expleo\",\"publisher\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#organization\",\"name\":\"Expleo | EN\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"width\":1600,\"height\":774,\"caption\":\"Expleo | EN\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Expleo | The urgent need to shift-left security testing","description":"Andy Morrison, Solutions Architect for ASG at Expleo Group discusses security testing in the second blog of the ASG Series.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/","og_locale":"en_GB","og_type":"article","og_title":"ASG Series: The urgent need to shift-left security testing","og_description":"Andy Morrison, Solutions Architect for ASG at Expleo Group discusses security testing in the second blog of the ASG Series.","og_url":"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/","og_site_name":"Global EN","article_modified_time":"2025-08-28T09:30:39+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/","url":"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/","name":"Expleo | The urgent need to shift-left security testing","isPartOf":{"@id":"https:\/\/expleo.com\/global\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/#primaryimage"},"image":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage.jpg","datePublished":"2021-07-02T13:06:00+00:00","dateModified":"2025-08-28T09:30:39+00:00","description":"Andy Morrison, Solutions Architect for ASG at Expleo Group discusses security testing in the second blog of the ASG Series.","breadcrumb":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/#primaryimage","url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage.jpg","contentUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage.jpg","width":1280,"height":720,"caption":"Hand reaching to the icons on the board"},{"@type":"BreadcrumbList","@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/expleo.com\/global\/en\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/expleo.com\/global\/en\/insights\/"},{"@type":"ListItem","position":3,"name":"ASG Series: The urgent need to shift-left security testing"}]},{"@type":"WebSite","@id":"https:\/\/expleo.com\/global\/en\/#website","url":"https:\/\/expleo.com\/global\/en\/","name":"Expleo | EN","description":"Expleo","publisher":{"@id":"https:\/\/expleo.com\/global\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/expleo.com\/global\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/expleo.com\/global\/en\/#organization","name":"Expleo | EN","url":"https:\/\/expleo.com\/global\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/expleo.com\/global\/en\/#\/schema\/logo\/image\/","url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","contentUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","width":1600,"height":774,"caption":"Expleo | EN"},"image":{"@id":"https:\/\/expleo.com\/global\/en\/#\/schema\/logo\/image\/"}}]}},"hreflang":{"rendered":"<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/\" hreflang=\"x-default\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/\" hreflang=\"en\"\/>\n","structure":[{"blogId":4,"blogIsHidden":false,"postId":1263,"url":"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/","language":"en","default":true}]},"_links":{"self":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights\/1263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights"}],"about":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/types\/insights"}],"author":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/users\/78"}],"version-history":[{"count":0,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights\/1263\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/media\/1271"}],"wp:attachment":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/media?parent=1263"}],"wp:term":[{"taxonomy":"topic","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/topic?post=1263"},{"taxonomy":"insights-single-templates","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights-single-templates?post=1263"},{"taxonomy":"industry-taxonomy","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/industry-taxonomy?post=1263"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/content-type?post=1263"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/country?post=1263"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/service?post=1263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}