Security and Compliance Engineering

20 Minutes of Code, 2000 Hours of Backbone.

  • SECURITY
  • 30 JAN 2026
  • blog

This Morning: The “Easy” Win

This morning we wrote a new chunk of code to interrogate our Git repos. It ran, produced a clean dataset, and stored it in our compliance WORM store.

Total dev time: about 20 minutes.

And no, that doesn’t mean it was “simple”. It means the platform did its job and made the correct path the easiest path. That is the whole point.


Me, The Pipeline: “Hi, I’d Like Some Access”

Here’s what actually happened, in normal English.

I’m a pipeline. I want access to a pipeline resource (Git). In a lot of systems this becomes a quick fix: a long-lived token, a wide role, a secret shoved into a config file, and a prayer.

We don’t do prayers. We do controls.

So the pipeline showed up with a proper identity from Entra, asked for access like an adult, and got issued the minimum scope it needed, for the minimum time it needed, with an auditable decision trail.

The pipeline didn’t need to know the org’s internal politics. It didn’t need a tribal-knowledge runbook. It didn’t need Mark to remember which secret goes in which hole. It just used the backbone.


Then I Did The Work: “I Interrogate Git”

Once access was granted, the pipeline did what pipelines should do: run the job, pull the facts, generate structured data, and move on.

No side quests. No human-in-the-loop nonsense. No “works on my laptop” energy.

Just clean extraction with provenance: which repo, which org, which commit references, when it ran, and what it saw.


Me, The Pipeline Again: “Cool, Now I Need To Store This”

Next step: persistence. And this is where most platforms quietly start lying.

Not maliciously. Just lazily.

They store results somewhere editable, overwrite yesterday, and act surprised later when audit asks: “What did you know on the 30th?” and the answer is “whatever the current database feels like.”

We don’t do vibes-based data.

The pipeline stored the output into the compliance WORM store: immutable by default, append-only for derived records, and anchored with integrity checks so tampering is obvious, not theoretical.

Translation: we can prove it, later, without drama.


The Part Everyone Misses: 20 Minutes Is The Reward

The 20 minutes this morning only exists because we spent the previous ~2000 hours building the boring parts properly.

The parts nobody wants to pay for until they’re in a boardroom explaining why their compliance story is basically “trust me, bro”.

We built the fireworks first: ingestion discipline, real immutability, access brokering, integrity signing, audit fabric, lifecycle controls.

So now we get the payoff: new pipeline ideas don’t trigger a security panic. They don’t require three approvals and a week of duct tape. They slot into a system designed to be reused.


Our Mantra, In Practice

Do it once. Not “do it again but slightly differently because this team likes YAML.”

Do it secure. Not “we’ll lock it down later” (later is where systems go to die).

Do it so you don’t have to know it. The user shouldn’t need to understand the control-plane plumbing to get work done.

Make it reusable. Because if we’re going to run it again (we are), it must be documented, production-ready, and boringly correct the first time.


Closing: Yeah, We’re That Good

Here’s the honest takeaway: most places celebrate the 20 minutes and ignore the 2000 hours.

We did the opposite. We invested in the backbone so the easy work stays easy, and the risky work stays controlled.

That’s why this morning felt effortless. Not because we got lucky. Because we built a platform where “the right way” is the default way.

And yes — it is fucking good. Not because it’s flashy, but because it’s reusable, defensible, and it doesn’t require heroics to operate. That’s what real engineering looks like.