Skip to content

DevSec For Scale Podcast – Common Startup Security Mistakes w/ Dan Yelovitch, develeap

In this episode of the “DevSec for Scale” podcast, host Jeremy Hess welcomes Dan Yelovitch, Chief DevOps Architect at develeap, a consulting company specializing in DevOps transformation. Dan discusses the critical importance of integrating security measures from the very beginning of a company’s growth. He emphasizes that as companies expand, their systems become more complex, making it harder to monitor and secure them. Dan stresses the necessity of implementing security protocols early to ensure that any issues can be detected and addressed immediately.

Dan shares a striking story from his consulting experience where a client provided public access to their database, including the administrator’s credentials. This company, despite having real customers and sensitive production data, treated such a serious security lapse as normal. Dan’s approach to rectifying this involved educating the client about the implications of their security practices and instilling a culture of security-first thinking. This foundational change ensured that future systems would be built with security in mind from the outset.

Moving on to common security challenges, Dan identifies several key areas where startups often falter. One major issue is the failure to implement a VPN early on, which can expose companies to significant risks as they scale. He explains that investing in VPNs and other security measures upfront can save companies from costly breaches and downtime in the future. Additionally, Dan highlights the problem of complex security systems that are difficult for users to navigate, advocating for simplicity to ensure compliance and proper usage.

Dan also underscores the importance of proper secrets management, noting that many companies treat secrets like passwords casually, leading to vulnerabilities. He advocates for using tools like HashiCorp Vault or Akeyless to manage secrets securely and share them easily among team members. He points out that effective secrets management not only enhances security but also simplifies the development process by making it easier to set up new systems and share necessary credentials securely.

Lastly, Dan talks about the critical role of monitoring in maintaining system security. He explains that monitoring should cover not just performance metrics but also security events, such as unusual activity that could indicate a breach. Effective monitoring helps teams respond quickly to incidents and maintain the integrity of their systems as they grow. Dan concludes with practical advice for developers, emphasizing the need to build systems that are secure, simple, and scalable from the start to avoid the pitfalls of temporary fixes and workarounds.