Code-to-Cloud Security: How we Scan Workloads (and Code) Without Breaking Production
The "Side-Scanning" Revolution (Agentless Security)
The core problem with traditional security is that it tries to run "inside the house." It sits on the server, fighting for resources.
Our approach separates the duties:
Why this matters to us:
The "Contextual" SAST: Fixing the Noise
For years, SAST (Static Application Security Testing) was the bane of an engineering team's existence. Traditional SAST tools scan source code and flag everything that looks remotely wrong. A team could get 5,000 alerts, and 4,990 of them would be false alarms.
Our Cloud Security Platform changes this by adding Runtime Context to our SAST scanning. It doesn't just look at the code; it looks at reachability specifically, can this vulnerable code actually be exploited from the internet?
This allows the team to ignore the noise and focus on the 10 alerts that actually matter, the ones affecting our data.
Hunting the Keys to the Kingdom (SaaS API Keys)
One of the biggest threats in 2025 isn't a sophisticated hacker breaking in; it's a developer accidentally leaving the "front door key" under the mat.
Recommended by LinkedIn
We use the platform's Secret Scanning to hunt for SaaS API Keys and hardcoded credentials. Developers sometimes accidentally commit API keys directly into the code. If a hacker finds that key, they can move laterally through our systems.
The paltform scans our entire environment, from the code repository (GitHub) to the running container to find these secrets before they can be exploited. It doesn't just find the key; it validates it. It tells us: "This is an active Stripe API key with 'Admin' privileges..." We can revoke that key in minutes.
Data Security Posture Management (DSPM): Knowing Where the sensitive data Is
At ZenBusiness, protecting the data is equally important as protecting the server. We use DSPM capabilities to automatically classify data.
The platform scans our cloud buckets and databases to identify PII (Personally Identifiable Information) and other sensitive records. It then checks the permissions on those specific assets.
The "Toxic Combination" (Attack Path Analysis)
Collecting data is easy. Making sense of it is hard. We use our cloud security platform to filter the noise by looking for Toxic Combinations. This is when multiple low-level risks combine to create a critical Attack Path.
For example, a "Toxic Combination" in our environment might look like this:
The platform connects these dots on a Security Graph. It tells us: "Ignore the 500 minor patches; fix this ONE server immediately because it is a gateway to the ZB Database."
The Bottom Line
By using the platform to correlate SAST, API Keys, Cloud Infrastructure, and Sensitive Data, we have removed the friction between "being secure" and "being high-performance." We are scanning deeper, finding risks faster, and protecting your data better using a balanced strategy of agentless speed and forensic agent depth.
Author: Rishabh Garg
#zenbusiness #cloudsecurity #llms #platformengineering