Back
#262
February 9, 2026

EP262 Freedom, Responsibility, and the Federated Guardrails: A New Model for Modern Security

Guest:

Topics:

CISO
29:29

Subscribe at YouTube

Subscribe at Spotify

Subscribe at Apple Podcasts

Topics covered:

  • You mentioned that centralized security can't work anymore. Can you elaborate on the key changes—driven by cloud, SaaS, and AI—that have made this traditional model unsustainable for a modern organization?
  • Why do some persist at centralized, top down approach to security, despite that?
  • What do you mean by "Freedom, Responsibility and distributed security”? 
  • Can you explain the difference between “centralized security” and what you define as “security with distributed ownership”?  Is this the same “federated”?
  • In our conversation you mentioned “cloud and AI- native”, what do you mean by this (especially “AI-native”) and how is this changing your approach to security? 
  • You introduce the concept of "Security as quality" suggesting that a security-unaware developer is essentially a bad software developer. How do you shift the culture and internal metrics to make security an inherent quality standard, rather than a separate, compliance-driven checklist?
  • You likened the central security team's new role to a "911 emergency service." Beyond incident response, what stays central no matter what, and how does the central team successfully influence the security posture of the entire organization without being directly responsible for the day-to-day work.

Do you have something cool to share? Some questions? Let us know:

Transcript

The conversation centers on the terminal decline of the traditional, centralized security model in favor of Distributed Security Ownership. The consensus is that in an era defined by cloud-native development and "utility-quality" AI, a single security team can no longer act as the universal gatekeeper without becoming a catastrophic bottleneck. The discussion explores the shift from top-down policy enforcement to a "libertarian" model of freedom and responsibility, where engineers are empowered—and expected—to be the primary security champions of their own domains.

The dialogue highlights that while certain functions must remain centralized (e.g., incident response, high-level risk strategy, and specialized threat intelligence), the execution of security must be integrated into the engineering lifecycle. By treating security as a component of "quality code," organizations can move away from friction-heavy compliance and toward a resilient, scalable defense posture.

Detailed Conversation Analysis

1. The Death of Centralization

The traditional model, where a central team approves every move, is dismissed as insufficient for two primary reasons:

Velocity: Cloud and AI development occur at a pace that manual central reviews cannot match.

Threat Evolution: New threats emerge and are exploited faster than a bottlenecked team can respond.

The alternative is a distributed model where the security team provides the tools, metrics, and guidance, but the individual product teams own the security outcomes.

2. Culture as the Security Foundation

Shulman-Peleg emphasizes that security management must be optimized for a company’s specific culture. At a firm like Kraken, the core values of "freedom and responsibility" allow for a natural transition to distributed ownership. Conversely, legacy organizations with a history of offloading security to a central "police" force face a steeper cultural climb, as their developers may not yet possess the mindset required to own security outcomes.

3. Security as Code Quality

A pivotal shift in the discussion is the reframing of security from a "compliance checkbox" to a "quality metric." Just as a developer is responsible for the reliability and performance of their code, they are responsible for its security.

The SRE Parallel: The model mirrors the Site Reliability Engineering (SRE) philosophy—building observability tools so teams can achieve reliability outcomes themselves.

Vulnerabilities vs. Misconfigurations: Shulman-Peleg argues for a unified ranking methodology. A publicly exposed S3 bucket is often more critical than a theoretical software vulnerability, yet legacy policies often treat them separately. In a modern model, these are unified under a single "quality" dashboard.

4. The Role of AI in 2026

AI is described as an extension of the cloud journey. While AI increases the speed of development, it also offers an opportunity to bake security into the "AI-native" development lifecycle from the start. AI does not necessitate a return to centralization; rather, it demands better automated metrics and clearer guidance to help developers manage the increased volume of code and configurations.

5. What Stays Central?

Despite the push for distribution, a "911" service remains essential. Certain areas require specialized expertise that cannot be expected of every engineer:

Incident Response (IR): When a crisis occurs, professional "firefighters" are needed.

High-Level Strategy: Long-term risk management and compliance roadmap.

Threat Intelligence: Monitoring nation-state actors and emerging global trends.

Timeline of Key Topics

Introduction and the "Inertia" of Cyber: Discussion on why the security industry resists change and the philosophical debate on whether security is more like "operations" or "development."

The Failure of Centralized Models: Alex Shulman-Peleg breaks down why centralization is unsustainable in the cloud/AI era due to speed and threat volume.

Cultural Context and "Freedom vs. Responsibility": How organizational values dictate the success of security models; an anecdote on engineers fixing risks spontaneously without being asked.

Centralized vs. Federated vs. Distributed: A deep dive into definitions and the "Hybrid" approach where some controls remain central while execution is local.

The "911" Analogy: Defining the boundaries of distributed ownership—when an engineer should handle a "cough" versus when they should call the emergency IR team.

Cloud and AI Native Development: Learning from cloud misconfigurations to better manage AI-driven development; the need for unified ranking systems for risks.

Security as Quality: The "Motorcycle Diaries" question—shifting the mentality so that "secure code" is simply "good code."

Closing Advice: The importance of cross-pollination; security teams must read about engineering, and engineers must read about cyber.

Final Recommendations from the Guest

For Security Teams: Deepen your understanding of system architecture and what engineering teams actually do.

For Engineering Teams: Cultivate curiosity regarding the threat landscape and how it impacts the products you build.

Continuous Visibility: Move away from legalistic policies and toward practical templates and real-time dashboards accessible to everyone, not just the security team.

View more episodes