You Thought Your Platform Was Secure... Think Again

You Thought Your Platform Was Secure... Think Again

When we talk about building internal platforms, there’s a common assumption:

If it’s inside the platform, it must be secure.

I wish it was true.

The reality? Most platforms today accidentally make security harder, slower, and easier to bypass, not better.

Security isn’t something you can slap on top of a platform and call it a day. It needs to be woven into the very fabric of how your platform works, or you’re setting your teams (and your company) up for failure.

Today, I want to share some hard lessons I’ve learned about how platforms either enable security... or quietly kill it.


The Problem: Platforms That Treat Security as an Afterthought

In many organizations, platform teams are under pressure to deliver fast. Spin up a golden path. Deploy an Internal Developer Platform. Ship tools and APIs for developers.

Security often gets left behind, or even worse, it gets outsourced to developers with extra steps and endless checklists:

  • "Don't forget to run a vulnerability scan before merging"
  • "Make sure you manually approve access requests"
  • "Remember to use the secure image template"

Sounds familiar?

This model doesn't work at scale. It relies on humans remembering to be secure, which is the opposite of real security.

When security feels like friction, developers do what humans do best: They find shortcuts.

And, in the end, the platform that was supposed to enforce security actually encourages people to ignore it.


What Secure-By-Default Actually Means

Building security into a platform doesn't mean more gates or longer checklists. It means that the secure choice is the easiest, most natural option.

Examples of secure-by-default in action:

  • Every pull request automatically runs SAST and dependency scans, without developers needing to configure anything.
  • Default templates for Kubernetes workloads include Pod Security Standards and resource limits baked in.
  • Secrets are automatically injected at runtime, encrypted, and rotated. No manual intervention needed.
  • IAM roles and permissions are tightly scoped by default. No wide-open admin rights "for now."

Notice the pattern?

No extra steps. No optional security. No assumptions that developers will "remember" to be secure.


The Role of Platform Engineering in DevSecOps

If you’re working on platform engineering today, you are not just an infrastructure provider.

You are a security enabler.

Your platform should do more than make developers faster. It should make them safer without slowing them down.

Here’s the shift that needs to happen:

❌ From: “Developers must remember to apply security best practices”.

✅ To: “The platform automatically applies security best practices, and developers can't easily skip them”.

The best DevSecOps practices aren’t about adding friction. They’re about removing the need for manual security decisions in the first place.


Good Platform Security vs. Bad Platform Security

Here’s a quick reality check:

Article content

Which side does your platform land on today?

Be honest.


If your platform makes security feel like an extra burden, it’s not a secure platform. It’s just another risk disguised as "acceleration."

Real security doesn't happen because you trust developers to do the right thing every time. It happens because the platform quietly forces the right thing to happen by default.

👉 Secure-by-default isn’t just a best practice, it’s the only sustainable path forward.


I’m curious: How does your platform handle security today? Is it helping or hurting?

Let’s talk in comments. I'd love to hear how you're approaching this in your organization.

Insightful read, Leo. Love this breakdown of secure-by-default — especially how it shifts security from a blocker to an enabler. When the secure path is also the easiest one (like pre-configured K8s templates, auto-injected secrets, or scoped IAM roles), you’re setting teams up for success without friction.

Very interesting mate! Important subject

To view or add a comment, sign in

More articles by Leo E.

Others also viewed

Explore content categories