Cisco Systems Inc.

09/24/2025 | News release | Distributed by Public on 09/24/2025 06:11

Bridging the Gap: Cisco’s Blueprint for Developer-Centric Cloud Security

In the fast-paced world of cloud development, security can often feel like a necessary but cumbersome hurdle. Developers, focused on delivering features and products, frequently find themselves at odds with security teams issuing a barrage of tickets, leading to "alert fatigue" and a perceived lack of buy-in. But what if security wasn't a roadblock, but an integrated, enabling force?

From Friction to Partnership: Engaging Developers in Security

The traditional security model often creates tension. Developers juggle competing priorities, and incessant security alerts that can overwhelm their workflows. To overcome this, Cisco has focused on several key strategies:

High-Fidelity, Prioritized Findings: Instead of a flood of generic alerts, security teams deliver highly accurate findings, prioritized by risk, with clear Service Level Agreements (SLAs) and actionable remediation guidance. This builds trust and accelerates resolution, as false positives can quickly erode developer confidence.

Paved Paths and Seamless Integration: Security shouldn't just identify problems; it should offer solutions. By providing "paved paths"-developer-friendly, pre-configured security solutions that integrate seamlessly into existing workflows-security becomes a natural part of the development process, not an add-on.

Communicating the "Why": Developers are more likely to engage when they understand the bigger picture. Explaining why a security measure is important, why now, and what's at stake if it's not done, fosters clarity, trust, and a sense of partnership.

Security as a First-Class Service: Treating security solutions and services as first-class offerings, complete with dedicated resources for development, maintenance, and operation, signals their importance. Establishing robust feedback channels ensures continuous improvement and developer input.

Empathy is Key: Perhaps most critically, security teams must operate from a position of empathy. Recognizing that developers are juggling many priorities helps security teams design solutions that are not only effective but also make developers' lives easier, rather than adding to their burden. When developers feel they've been part of the design and implementation, adoption naturally follows.

This approach has fostered a vibrant community of developers eager to learn, share, and co-design security solutions, viewing security as a shared organizational goal rather than solely the security team's responsibility.

Scaling Security in a Complex Cloud Environment

Cisco's cloud environment is vast and complex, encompassing thousands of cloud accounts, multi-cloud deployments, and unique tech stacks brought in via acquisitions. To manage this scale and the evolving threat landscape (from misconfigurations to new AI-driven risks), a robust cloud security program relies on three essential elements:

  1. Strong Governance Foundation: This includes security standards aligned with business objectives and risk thresholds, unified security monitoring, clear asset attribution for alerting, centralized logging for forensics, and appropriate access for security teams to enable incident response and tooling.
  2. Risk Remediation Program: A system for risk-based prioritization and alerting of vulnerabilities, complete with defined SLAs and remediation guidance.
  3. Risk Prevention Program: This is where "paved-paths" integrate seamlessly into developer workflows and prevent security issues from occurring in the first place. For example security guardrails for cloud resource configuration, secure-by-default base images for containers and VMs.

The goal is to build a consistent security baseline across the entire environment and mature that baseline over time. The key is to embrace complexity by defining clear standards, automating compliance, and focusing on risk prevention techniques that are both more effective and reduce the burden on engineering teams.

The Power of Proactive Security: "Secure by Default" in Action

Cisco champions a "secure by default" approach, aiming to make the secure choice the easy choice. Our security guardrails automatically identify, prevent and remediate common cloud misconfigurations across Cisco's AWS, Azure and GCP cloud footprint.

How it works: This approach leverages native cloud capabilities, preventive policies, and custom auto-remediation tools across major public cloud providers. It tackles common misconfigurations like:

  • Unauthorized access
  • Weak password policies and authentication methods
  • Publicly exposed cloud storage and databases
  • Publicly exposed remote administration ports

The results are measurable. Cisco tracks adoption percentages across its cloud fleet and "trigger counts" that signal potential security incidents that were actively averted by these guardrails. This provides concrete evidence of risk reduction, a significant win for security teams. Furthermore, it dramatically reduces the number of repetitive security tickets for developers, freeing them to focus on innovation.

Implementing "secure by default" requires thorough testing (often starting in "audit mode"), strong communication with the cloud user community, and an understanding that while it's highly effective, it takes time to roll out. For immediate, emerging risks, monitoring and ticketing capabilities remain crucial.

Navigating the AI Frontier in Cybersecurity

AI is rapidly becoming a critical tool for enhancing security programs. Cisco is leveraging AI for productivity enhancements, automating repetitive tasks like user support, freeing up security staff for more human-intensive work like cloud architecture and solution design. AI also supports vulnerability management by prioritizing vulnerabilities based on factors like exploitability, asset criticality, and potential impact.

However, AI also introduces new risks. Cisco is actively managing these by inventorying AI Services and ensuring proper configuration to prevent potential data leakage and infrastructure compromise. Robust Cloud Security Posture Management (CSPM) tools are essential here. Establishing guardrails to secure the use of AI in the cloud further prevents security incidents due to the use of this new technology. Preventing use of unapproved AI models, preventing prompt injection attacks that by-pass built in safeguards and jailbreak LLMs and Enabling content filtering to remove unwanted and harmful content in model generated text and image are examples of guardrails that secure the use of AI in the cloud.

The Future of Security: Collaboration and Innovation

It's time to move from reactive enforcement to proactive enablement and collaborating with developers as partners rather than obstacles.

By implementing "secure by default" guardrails, prioritizing high-fidelity findings over alert volume, and fostering a culture of shared responsibility built on empathy and clear communication, organizations can transform security from a bottleneck into a competitive advantage. As the threat landscape evolves with AI and increasingly complex multi-cloud environments, the companies that succeed will be those that embrace proactive risk prevention and recognize that the most sophisticated security technology is only as effective as the human collaboration that supports it.

We'd love to hear what you think! Ask a question and stay connected with Cisco Security on social media.

Cisco Security Social Media

LinkedIn
Facebook
Instagram
X

Cisco Systems Inc. published this content on September 24, 2025, and is solely responsible for the information contained herein. Distributed via Public Technologies (PUBT), unedited and unaltered, on September 24, 2025 at 12:11 UTC. If you believe the information included in the content is inaccurate or outdated and requires editing or removal, please contact us at [email protected]