You Thought Your Platform Was Secure... Think Again
When we talk about building internal platforms, there’s a common assumption:
If it’s inside the platform, it must be secure.
I wish it was true.
The reality? Most platforms today accidentally make security harder, slower, and easier to bypass, not better.
Security isn’t something you can slap on top of a platform and call it a day. It needs to be woven into the very fabric of how your platform works, or you’re setting your teams (and your company) up for failure.
Today, I want to share some hard lessons I’ve learned about how platforms either enable security... or quietly kill it.
The Problem: Platforms That Treat Security as an Afterthought
In many organizations, platform teams are under pressure to deliver fast. Spin up a golden path. Deploy an Internal Developer Platform. Ship tools and APIs for developers.
Security often gets left behind, or even worse, it gets outsourced to developers with extra steps and endless checklists:
Sounds familiar?
This model doesn't work at scale. It relies on humans remembering to be secure, which is the opposite of real security.
When security feels like friction, developers do what humans do best: They find shortcuts.
And, in the end, the platform that was supposed to enforce security actually encourages people to ignore it.
What Secure-By-Default Actually Means
Building security into a platform doesn't mean more gates or longer checklists. It means that the secure choice is the easiest, most natural option.
Examples of secure-by-default in action:
Notice the pattern?
Recommended by LinkedIn
No extra steps. No optional security. No assumptions that developers will "remember" to be secure.
The Role of Platform Engineering in DevSecOps
If you’re working on platform engineering today, you are not just an infrastructure provider.
You are a security enabler.
Your platform should do more than make developers faster. It should make them safer without slowing them down.
Here’s the shift that needs to happen:
❌ From: “Developers must remember to apply security best practices”.
✅ To: “The platform automatically applies security best practices, and developers can't easily skip them”.
The best DevSecOps practices aren’t about adding friction. They’re about removing the need for manual security decisions in the first place.
Good Platform Security vs. Bad Platform Security
Here’s a quick reality check:
Which side does your platform land on today?
Be honest.
If your platform makes security feel like an extra burden, it’s not a secure platform. It’s just another risk disguised as "acceleration."
Real security doesn't happen because you trust developers to do the right thing every time. It happens because the platform quietly forces the right thing to happen by default.
👉 Secure-by-default isn’t just a best practice, it’s the only sustainable path forward.
I’m curious: How does your platform handle security today? Is it helping or hurting?
Let’s talk in comments. I'd love to hear how you're approaching this in your organization.
Insightful read, Leo. Love this breakdown of secure-by-default — especially how it shifts security from a blocker to an enabler. When the secure path is also the easiest one (like pre-configured K8s templates, auto-injected secrets, or scoped IAM roles), you’re setting teams up for success without friction.
Thanks for sharing!
Thanks for sharing, Leo
Very interesting mate! Important subject