{"id":147873,"date":"2024-05-02T22:57:51","date_gmt":"2024-05-02T20:57:51","guid":{"rendered":"https:\/\/jfrog.com\/blog\/shift-left-vs-shift-right-security\/"},"modified":"2025-01-27T18:18:56","modified_gmt":"2025-01-27T16:18:56","slug":"shift-left-vs-shift-right-security","status":"publish","type":"post","link":"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/","title":{"rendered":"Shift Left &#038; Shift Right f\u00fcr umfassende Anwendungssicherheit"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignnone size-full wp-image-130103\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03145012\/863x300-4-1.png\" alt=\"\" width=\"863\" height=\"300\" \/><\/p>\n<p>Trotz aller Bem\u00fchungen von Unternehmen, Bedrohungen Ihrer Software- &amp; IT-Sicherheit abzuwehren, nehmen diese immer weiter zu. Dazu entwickeln Angreifer auch immer raffiniertere Taktiken. Und die Lage wird sich weiter zuspitzen, da Angreifer immer h\u00e4ufiger k\u00fcnstliche Intelligenz (KI) und Machine Learning (ML) einsetzen.<\/p>\n<p>Um sich vor diesen Bedrohungen zu sch\u00fctzen, m\u00fcssen Security Teams daher \u00fcber ihren gesamten Software Development Lifecycle (SDLC) hinweg mehr Security-Ma\u00dfnahmen und -Checks einf\u00fchren. Konkret bedeutet das eine Kombination aus proaktivem (Shift-Left) und reaktivem (Shift-Right) Ansatz zur Sicherung von Anwendungen in jeder Phase der Entwicklung.<\/p>\n<p>Das Konzept Shift-Left ist bereits l\u00e4nger bekannt, entwickelt sich aber st\u00e4ndig weiter. Entwickler nutzen immer \u00f6fter generative KI-Tools wie Copilot, um schneller mehr, sicheren Code schreiben zu k\u00f6nnen. Bei Shift-Right dagegen geht es vorrangig um einen Schutz der Produktionsumgebung, die je nach Bereitstellungsstrategie auch containerisierte Anwendungen und Cloud-native Deployments umfassen kann.<\/p>\n<p>Um alles rund um dieses Thema zu erfahren, laden Sie sich am besten unser E-Book <a href=\"https:\/\/jfrog.com\/de\/ebook\/shift-left-and-right-sdlc-security\/\">\u201cShift-Left &amp; Shift-Right als Schl\u00fcssel zu einer durchg\u00e4ngig sicheren Software-Lieferkette\u201d<\/a> herunter<\/p>\n\n    <a class=\"button button-primary\"  href=\"https:\/\/jfrog.com\/ebook\/shift-left-and-right-sdlc-security\/\" target=\"_self\">\n    <span>Hier geht\u2019s zum Download<\/span>\n    <\/a>\n    \n<h2>Was bedeutet Shift-Right-Securtiy?<\/h2>\n<p>Der Shift-Right-Ansatz legt den Schwerpunkt auf kontinuierliche Sicherheitstests von Anwendungen, die in Produktionsumgebungen laufen, auf das Setup kontinuierlich laufender Security-Checks und darauf, Schwachstellen, die nach der Bereitstellung entdeckt wurden mit dem n\u00e4chsten Update zu schlie\u00dfen.<\/p>\n<p>W\u00e4hrend Shift-Left der bekanntere Ansatz ist, braucht es f\u00fcr eine umfassende End-To-End<a href=\"https:\/\/jfrog.com\/de\/learn\/software-supply-chain\/\">Security der Software-Lieferkette<\/a> auch Shift-Right.<\/p>\n<p>Der Fokus liegt auf Sicherheitsma\u00dfnahmen w\u00e4hrend der Laufzeit- und Bereitstellungsphase, um die Usability zu verbessern und sicherzustellen, dass es keine Probleme gibt, bevor Software-Updates ver\u00f6ffentlicht werden. Dazu geh\u00f6ren das Monitoring von Produktionsumgebungen, das Erkennen von und Reagieren auf Sicherheitsvorf\u00e4lle und die kontinuierliche Verbesserung der Sicherheit ihrer Software auf der Grundlage von R\u00fcckmeldungen aus der Praxis.<\/p>\n<p>Der Shift-Right Security Ansatz erkennt an, dass Schwachstellen in Produktionsumgebungen vorhanden sein k\u00f6nnen oder neu Auftreten, was die Angriffsfl\u00e4che um Probleme wie Fehlkonfigurationen, anf\u00e4llige Container-Images und Laufzeit-Exploits vergr\u00f6\u00dfert.<\/p>\n<h2>Was bedeutet Shift-Left-Security?<\/h2>\n<p>Shift-Left-Security dagegen beschreibt das Konzept, Sicherheitsma\u00dfnahmen schon m\u00f6glichst fr\u00fch w\u00e4hrend des<a href=\"https:\/\/jfrog.com\/de\/learn\/sdlc\/\">Software Development Lifecycle (SDLC)<\/a> zu integrieren, was die Wahrscheinlichkeit verringert, Schwachstellen in die Entwicklungsumgebung einzuf\u00fchren.<br \/>\nDeveloper, die quasi ganz \u201clinks\u201d im Entwicklungsprozess sitzen, sorgen bereits durch sichere Programmier-Praktiken daf\u00fcr, dass unsicherer Code in eine Bin\u00e4rdatei kompiliert wird.<\/p>\n<p>Ziel von <a href=\"https:\/\/jfrog.com\/de\/devops-tools\/article\/what-why-how-of-shift-left-security\/\">Shift-Left ist es die Angriffsfl\u00e4che zu verringern, indem Schwachstellen, wie riskante Programmierung oder Sicherheitsl\u00fccken bei der Authentifizierung fr\u00fchzeitig gel\u00f6st werden. Das fr\u00fche Identifizieren und Beheben von Fehlern und Problemen reduziert auch die Kosten und Komplikationen.<\/a><\/p>\n<h2>Shift-Left vs. Shift-Right<\/h2>\n<p>Shift-Left- und Shift-Right-Sicherheit sind zwei unterschiedliche Ans\u00e4tze, die Sicherheitsma\u00dfnahmen in die verschiedenen Phasen des Softwareentwicklungszyklus integrieren. Bei Shift-Right werden Sicherheitsma\u00dfnahmen bis in die Produktionsumgebung und in die Laufzeit mit gezogen, w\u00e4hrend Shift-Left die fr\u00fcheren Phasen des Prozesses abdeckt.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-130089\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/02212730\/Screenshot-2024-05-01-at-4.18.55%E2%80%AFPM.png\" alt=\"\" width=\"982\" height=\"206\" \/><\/p>\n<p>W\u00e4hrend die Shift-Left-Ans\u00e4tze Probleme fr\u00fchzeitig zu erkennen versucht, bietet Shift-Right-Testing einen entscheidenden Schutz f\u00fcr die Bereitstellung und die Laufzeitumgebung und stellt sicher, dass die Anwendung unter allen Umst\u00e4nden wie vorgesehen funktioniert.<br \/>\nDie effektivste Strategie zur Absicherung der Software-Lieferkette ist es, sowohl den Shift-Links- als auch den Shift-Rechts-Ansatz zu verfolgen und beide Konzepte zu kombinieren.<\/p>\n<h3>Den gesamten Software-Lebenszyklus absichern<\/h3>\n<p>Der SDLC ist ein Framework, das einen effektiven Prozess f\u00fcr alle Schritte der Softwareentwicklung definiert &#8211; auch was Kosten und Zeit angeht. Im Verlauf der Softwareentwicklung k\u00f6nnen in jeder Phase neue Schwachstellen auftreten. Um Attacken zu verhindern und effiziente und sichere Software Releases gew\u00e4hrleisten zu k\u00f6nnen, ist es entscheidend, kontinuierlich und \u00fcber den gesamten SDLC hinweg Sicherheitsma\u00dfnahmen zu ergreifen.<\/p>\n<h2>Next steps<\/h2>\n<p>Die zunehmenden Bedrohungen der Software-Lieferkette von Unternehmen sind ein akutes Problem, insbesondere angesichts der Fortschritte bei k\u00fcnstlicher Intelligenz und maschinellem Lernen. Um diesem Problem zu begegnen, ist es entscheidend, umfassende Sicherheitskontrollen \u00fcber den gesamten SDLC zu implementieren. Dazu geh\u00f6rt ein proaktiver Shift-Left-Ansatz ebenso wie ein reaktiver Shift-Right-Ansatz. Durch die Kombination dieser Security-Konzepte k\u00f6nnen Unternehmen ihre Applikationen in jeder Phase der Entwicklung effektiv sch\u00fctzen.<\/p>\n<p>Weitere Informationen \u00fcber die Anwendung eines Shift-Left- und eines Shift-Right-Ansatzes f\u00fcr Software-Supply Chain Security finden Sie <a href=\"https:\/\/jfrog.com\/ebook\/shift-left-and-right-sdlc-security\/\">in unserem E-Book<\/a>.<\/p>\n<p>Oder, wenn Sie es etwas komprimierter m\u00f6gen, sehen Sie sich folgenden &lt;<a href=\"https:\/\/jfrog.com\/infographic\/shift-left-and-shift-right-security-strategies\/\">Shift Everywhere<\/a>&gt; Infografik an:<\/p>\n<figure id=\"attachment_128869\" aria-describedby=\"caption-attachment-128869\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/jfrog.com\/de\/infographic\/shift-left-and-shift-right-security-strategies\/\"><img decoding=\"async\" class=\"wp-image-128869\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2024\/04\/18151150\/JFrog_Shift-left_Shift-Right-2.png\" alt=\"\" width=\"600\" height=\"1682\" \/><\/a><figcaption id=\"caption-attachment-128869\" class=\"wp-caption-text\">Klicken Sie oben, um die vollst\u00e4ndige Infografik zu sehen<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Trotz aller Bem\u00fchungen von Unternehmen, Bedrohungen Ihrer Software- &amp; IT-Sicherheit abzuwehren, nehmen diese immer weiter zu. Dazu entwickeln Angreifer auch immer raffiniertere Taktiken. Und die Lage wird sich weiter zuspitzen, da Angreifer immer h\u00e4ufiger k\u00fcnstliche Intelligenz (KI) und Machine Learning (ML) einsetzen. Um sich vor diesen Bedrohungen zu sch\u00fctzen, m\u00fcssen Security Teams daher \u00fcber ihren &hellip;<\/p>\n","protected":false},"author":506,"featured_media":130098,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[10157],"tags":[10719,10720,10721,10011],"class_list":["post-147873","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sicherheit-und-devsecops","tag-shift-right-de","tag-shift-left-de","tag-security-de","tag-devsecops-de","resource_categories-security","resource_categories-devsecops"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.6 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Shift Left &amp; Shift Right f\u00fcr umfassende Anwendungssicherheit | JFrog<\/title>\n<meta name=\"description\" content=\"Shift-left and shift-right security are two distinct approaches that integrate security practices at different stages of the software development lifecycle.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts\/147873\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shift Left &amp; Shift Right f\u00fcr umfassende Anwendungssicherheit\" \/>\n<meta property=\"og:description\" content=\"Shift-left and shift-right security are two distinct approaches that integrate security practices at different stages of the software development lifecycle.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/\" \/>\n<meta property=\"og:site_name\" content=\"JFrog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/artifrog\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-02T20:57:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-27T16:18:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144851\/1200x630.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"zoer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jfrog\" \/>\n<meta name=\"twitter:site\" content=\"@jfrog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"zoer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/\"},\"author\":{\"name\":\"zoer\",\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e\"},\"headline\":\"Shift Left &#038; Shift Right f\u00fcr umfassende Anwendungssicherheit\",\"datePublished\":\"2024-05-02T20:57:51+00:00\",\"dateModified\":\"2025-01-27T16:18:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/\"},\"wordCount\":745,\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png\",\"keywords\":[\"shift-right\",\"shift-left\",\"security\",\"DevSecOps\"],\"articleSection\":[\"Sicherheit und DevSecOps\"],\"inLanguage\":\"de-DE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/\",\"url\":\"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/\",\"name\":\"Shift Left & Shift Right f\u00fcr umfassende Anwendungssicherheit | JFrog\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png\",\"datePublished\":\"2024-05-02T20:57:51+00:00\",\"dateModified\":\"2025-01-27T16:18:56+00:00\",\"description\":\"Shift-left and shift-right security are two distinct approaches that integrate security practices at different stages of the software development lifecycle.\",\"breadcrumb\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/#primaryimage\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png\",\"width\":203,\"height\":148},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jfrog.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shift Left &#038; Shift Right f\u00fcr umfassende Anwendungssicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jfrog.com\/de\/#website\",\"url\":\"https:\/\/jfrog.com\/de\/\",\"name\":\"JFrog\",\"description\":\"Deliver Trusted Software Releases at Speed and Scale\",\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jfrog.com\/de\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jfrog.com\/de\/#organization\",\"name\":\"JFrog\",\"url\":\"https:\/\/jfrog.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"width\":74,\"height\":73,\"caption\":\"JFrog\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/artifrog\",\"https:\/\/x.com\/jfrog\",\"https:\/\/www.linkedin.com\/company\/455737\",\"https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg\",\"https:\/\/www.wikidata.org\/wiki\/Q98608948\"],\"description\":\"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.\",\"legalName\":\"Jfrog, Inc.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e\",\"name\":\"zoer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g\",\"caption\":\"zoer\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Shift Left & Shift Right f\u00fcr umfassende Anwendungssicherheit | JFrog","description":"Shift-left and shift-right security are two distinct approaches that integrate security practices at different stages of the software development lifecycle.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts\/147873","og_locale":"de_DE","og_type":"article","og_title":"Shift Left & Shift Right f\u00fcr umfassende Anwendungssicherheit","og_description":"Shift-left and shift-right security are two distinct approaches that integrate security practices at different stages of the software development lifecycle.","og_url":"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/","og_site_name":"JFrog","article_publisher":"https:\/\/www.facebook.com\/artifrog","article_published_time":"2024-05-02T20:57:51+00:00","article_modified_time":"2025-01-27T16:18:56+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144851\/1200x630.png","type":"image\/png"}],"author":"zoer","twitter_card":"summary_large_image","twitter_creator":"@jfrog","twitter_site":"@jfrog","twitter_misc":{"Written by":"zoer","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/#article","isPartOf":{"@id":"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/"},"author":{"name":"zoer","@id":"https:\/\/jfrog.com\/de\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e"},"headline":"Shift Left &#038; Shift Right f\u00fcr umfassende Anwendungssicherheit","datePublished":"2024-05-02T20:57:51+00:00","dateModified":"2025-01-27T16:18:56+00:00","mainEntityOfPage":{"@id":"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/"},"wordCount":745,"publisher":{"@id":"https:\/\/jfrog.com\/de\/#organization"},"image":{"@id":"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png","keywords":["shift-right","shift-left","security","DevSecOps"],"articleSection":["Sicherheit und DevSecOps"],"inLanguage":"de-DE"},{"@type":"WebPage","@id":"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/","url":"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/","name":"Shift Left & Shift Right f\u00fcr umfassende Anwendungssicherheit | JFrog","isPartOf":{"@id":"https:\/\/jfrog.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/#primaryimage"},"image":{"@id":"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png","datePublished":"2024-05-02T20:57:51+00:00","dateModified":"2025-01-27T16:18:56+00:00","description":"Shift-left and shift-right security are two distinct approaches that integrate security practices at different stages of the software development lifecycle.","breadcrumb":{"@id":"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/#primaryimage","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png","width":203,"height":148},{"@type":"BreadcrumbList","@id":"https:\/\/jfrog.com\/de\/blog\/shift-left-vs-shift-right-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jfrog.com\/de\/"},{"@type":"ListItem","position":2,"name":"Shift Left &#038; Shift Right f\u00fcr umfassende Anwendungssicherheit"}]},{"@type":"WebSite","@id":"https:\/\/jfrog.com\/de\/#website","url":"https:\/\/jfrog.com\/de\/","name":"JFrog","description":"Deliver Trusted Software Releases at Speed and Scale","publisher":{"@id":"https:\/\/jfrog.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jfrog.com\/de\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/jfrog.com\/de\/#organization","name":"JFrog","url":"https:\/\/jfrog.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","width":74,"height":73,"caption":"JFrog"},"image":{"@id":"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/artifrog","https:\/\/x.com\/jfrog","https:\/\/www.linkedin.com\/company\/455737","https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg","https:\/\/www.wikidata.org\/wiki\/Q98608948"],"description":"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.","legalName":"Jfrog, Inc.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}},{"@type":"Person","@id":"https:\/\/jfrog.com\/de\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e","name":"zoer","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/jfrog.com\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g","caption":"zoer"}}]}},"_links":{"self":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts\/147873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/users\/506"}],"replies":[{"embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/comments?post=147873"}],"version-history":[{"count":7,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts\/147873\/revisions"}],"predecessor-version":[{"id":147888,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts\/147873\/revisions\/147888"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/media\/130098"}],"wp:attachment":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/media?parent=147873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/categories?post=147873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/tags?post=147873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}