Shifting Security Left with Agentic AI

Applying AI to Proactively Secure the Design Phase

Matt Uebel

Solutions Architect Candidate

The Problem: A Costly and Persistent Threat

Insecure software provisioning is a silent killer of productivity and security, leading to costly rework, project delays, and critical security incidents.

High Costs

Fixing flaws in production is exponentially more expensive.

Project Delays

Last-minute security findings halt deployments.

Major Incidents

Misconfigurations are a leading cause of data breaches.

To solve this, we first need to understand the evolution of Generative AI.

Our Discussion in Two Parts

  • 1
    The Technology: Explore how GenAI is evolving from a chatbot into a reasoning engine.
  • 2
    The Solution: Outline a system to solve our problem and a practical journey to build it.

Part 1: The AI We See is a Chatbot

For many, GenAI is a clever conversationalist. We treat it like a person because it's the most intuitive way to interact.

The Real Revolution: Code that Understands Language

The true power is in translating human goals directly into machine-parsable syntax. It creates a strange but powerful new paradigm where we find ourselves writing plain language inside our scripts and codebases.

Example: Natural Language to IaC

"Create a public S3 bucket."

resource "aws_s3_bucket" "b" {
      bucket = "marketing-assets-12345"
      acl    = "public-read"
    }

Example: Natural Language to SQL

"Show me sales by region for last quarter."

SELECT region, SUM(amount)
    FROM sales
    WHERE sale_date >= '2025-01-01'
    AND sale_date < '2025-04-01'
    GROUP BY region;

Example: Human Language in a Python Script

/usr/local/bin/python

def summarize_security_report(report_text):

# The "prompt" is where semantics and syntax collide.

prompt = f"""

You are a security analyst. Please summarize the key

vulnerabilities from the following report and list the

top 3 most critical items.

REPORT: {report_text}

"""

# This looks like a normal API call, but it's powered by intent.

response = genai_api.generate(prompt)

return response.summary

The Hottest New Programming Language

Profile

Andrej Karpathy

@karpathy

Tweet from Andrej Karpathy that says The hottest new programming language is English

The Shift to Agentic AI

Instructional Systems

We predict behavior based on its explicit programming.

Input -> Rules -> Output

Agentic Systems

We predict behavior by treating the AI as a rational agent with goals.

Goal -> Beliefs -> Action

This shift allows us to move from giving perfect instructions to simply stating our high-level intent.

An Emerging Ecosystem for Agents

This agentic paradigm isn't just theoretical. A new technology stack is emerging to support it, exemplified by concepts like Anthropic's Model Context Protocol (MCP).

Agent-Readable Docs

Writing documentation not just for humans, but for AIs to understand and use tools, as pioneered by companies like Stripe.

Model Context Protocol (MCP)

A standardized way for an AI agent to ask an application, "What can you do, and how do I talk to you?"—an API for AIs.

Example: Agent-Readable Documentation

Vercel's llms.txt file showing markdown formatted documentation for an AI agent

This is a real-world example from Vercel: a simple llms.txt file providing clean, structured markdown for an AI to consume.

So... we have a powerful new technology.

Now, let's apply it.

Applying Agentic AI to a Costly Problem

Let's return to the problem we started with: the exponential cost of discovering security flaws too late.

Design

Cost: 1x

Implement

Cost: ~6.5x

Testing

Cost: ~15x

Production

Cost: >30x

Part 2: The Solution & Implementation

An Automated Security Review System for Design Documents

The solution is a system that applies agentic AI to proactively analyze planning documents. It works in four stages:

1. Ingest & Correlate

2. Detect Intent

3. Analyze vs. Corpus

4. Flag & Advise

The Core Concept: Combining Plans and Policy

Infrastructure Plans

Slack, Google Docs, etc.

+

Security Policy Corpus

CIS, Internal Policies, etc.

Actionable Security Insight

The System in Action

[ Mock Demo ]

Enter your infrastructure plan:

[Automated Review]: Analysis will appear here...

Enter a plan above and click the button to see the AI in action.

Adoption: Culture and Controls

Recognizing the Challenge

A fully automated system can be alarming. We must address potential cultural friction head-on by acknowledging concerns like the "chilling effect" on brainstorming or alert fatigue.

Framework for Trust

Phased adoption via ad-hoc, self-serve, and active functions helps build trust. A clear "What, Why, How" message is critical: this is a safety net to *assist*, not a surveillance tool to *report*.

Building an Enterprise-Ready System

To succeed, the system must be built with robust, transparent controls from day one.

Privacy Controls

Ability to exclude sensitive documents and mask PII.

Audit Trails

Log all findings and user interactions for review and compliance.

RBAC/ABAC

Manage who can configure policies, view findings, or grant exceptions.

Model Governance

Version, track, and approve the AI models used for analysis.

The Implementation Journey

1

Manual

An ad hoc tool for developers to self-check plans.

2

Advisory

The system passively monitors document stores and adds comments.

3

Guardrails

The system acts as a blocking quality gate in the CI/CD pipeline.

Example: The Active Check (CI/CD)

Pull Request #42: New Marketing Service

Linting... OK

Formatting Check... OK

Automated Security Review... FAILED

Heads up! I've identified a potential risk in this plan.

Risk: Publicly accessible S3 buckets are a common source of data breaches.

Recommendation: Use CloudFront with signed URLs instead.

Policy: See CLOUD-GUIDE-07.1

Example: The Interactive Check (ChatOps)

# proj-alpha-dev
User Avatar

Alice

Okay team, for the user profile pictures, let's just create a new public S3 bucket. That'll make them easy to access from the web client.

User Avatar

Bob

Sounds good to me, much simpler than setting up a whole CDN and signing URLs.

User Avatar

Alice

@Automated Review can you check our plan in the last 2 messages?

Bot Avatar

Automated Review BOT

Heads up! A plan to create a public S3 bucket was detected.

  • Risk: Public S3 buckets can lead to data exposure if misconfigured.
  • Policy: See `SEC-POL-04.2: Data Classification`.

Example: The Passive Check

Project Alpha - Design Doc

...and to simplify access for the web client, we'll just create a new public S3 bucket for all the user profile pictures.

[Automated Review]: Heads up!

A plan to create a public S3 bucket was detected.

  • Risk: Public S3 buckets can lead to data exposure if misconfigured.
  • Policy: See `SEC-POL-04.2: Data Classification`.
  • Recommendation: Consider using CloudFront with signed URLs.

This allows us to maintain a central repository for these assets...

The Value of Automated Security Review

This isn't just a scanner; it's a proactive system that scales security expertise and improves developer velocity.

✓ Shift Security Left, For Real

Identify and fix design flaws before a single line of insecure code is written.

✓ Scale Your Security Team

Embed the knowledge of your best security architects into an automated system.

✓ Accelerate Development

Reduce late-stage rework and eliminate entire categories of vulnerabilities.

✓ Educate and Empower

Provide developers with immediate, context-aware feedback to build their security skills.

Thank You & Discussion

By moving beyond the chatbot, we can use GenAI as an integrated reasoning engine.

We can apply this engine to solve the expensive problem of insecure design.

The result is a system that proactively guides and secures our development lifecycle from the very beginning.

The Splunk Connection

"A system like this is fundamentally a data problem. It relies on ingesting diverse, unstructured telemetry, correlating it, and running advanced analytics to surface actionable insights. This aligns perfectly with Splunk's core mission of turning data into doing."

1 / 24