What is a security champion? A guide for cloud teams

Wiz Experts Team
Key takeaways about security champions:
  • A security champion is a developer or engineer who acts as the security liaison for their team, bridging the gap between centralized security and distributed engineering squads without becoming a full-time security hire.

  • The most effective champion programs fail when they rely on volunteers with no dedicated time, unclear responsibilities, or access only to noisy alert feeds instead of prioritized, contextual risk data.

  • Champions need scoped visibility into their own team's infrastructure and applications, not organization-wide dashboards that overwhelm them with irrelevant findings.

  • In cloud-native environments, champions must understand how vulnerabilities connect to runtime exposure, identity permissions, and data access to prioritize what actually matters in production.

  • Wiz enables security champion programs by providing role-based project views, contextual prioritization through the Security Graph, and shift-left tooling that integrates directly into developer workflows.

What is a security champion?

A security champion is a developer or engineer designated as the security point person for their development team. This role exists because centralized security teams cannot scale linearly to match the velocity of modern software development. Champions extend the security team's reach directly into engineering squads without requiring the organization to add dedicated security headcount for every team.

Champions are not expected to become deep security experts or replace professional security engineers. Instead, they serve as the first line of awareness, triage, and escalation for their team's specific security concerns. They understand the context of the application better than an outsider and can identify risks early in the design and build phases.

This role typically represents a percentage of the champion's total workload rather than a full-time position. In most successful models, organizations allocate 10-20% of a champion's time specifically for security-related tasks, allowing them to balance these duties with their primary development work.

Secure Coding Best Practices [Cheat Sheet]

In this 11 page cheat sheet we'll cover 10+ essential security topics, offering practical steps for areas like API security, input validation, and containerized application protection—ideal for both beginner and advanced users.

Why security champions matter in cloud-native development

Modern engineering organizations face a massive scaling problem: with a workforce gap of nearly 4.8 million, there are often dozens to hundreds of developers for every single security engineer, depending on organization size and security maturity. In this environment, ephemeral infrastructure changes constantly, and code is deployed multiple times a day. Traditional security models, where a central team manually reviews a large share of changes before deployment, cannot keep pace with the velocity of CI/CD pipelines and infrastructure as code (IaC).

This reality forces a cultural shift toward security as a shared responsibility, aligning with DevSecOps best practices. Security can no longer be a gate at the end of the pipeline; it must be embedded into the engineering process itself. Champions facilitate this shift by acting as embedded security advocates who understand the team's specific workflows and constraints.

Cloud-native architectures, such as containers, serverless functions, and microservices, create distributed complexity that requires distributed security awareness. A central team often lacks the context to know if a specific microservice handles sensitive data or if a container is exposed to the public internet by design. Security champions act as distributed sensors and responders, catching issues early and routing them to the right people before they become production incidents.

What does a security champion do?

A security champion's scope is defined by bridging the gap between development and security, not by performing deep forensic analysis or penetration testing. They are expected to be the first line of awareness and escalation for their team, ensuring that security considerations are part of daily engineering decisions. The role balances these security responsibilities with their primary work as a developer or engineer.

Core responsibilities

  • Triage and prioritize security findings for their team's applications and infrastructure to ensure critical issues are addressed first.

  • Translate security requirements into developer-friendly guidance that teammates can easily implement within their existing workflows.

  • Participate in threat modeling and design reviews for new features to identify potential risks before code is written.

  • Champion secure coding practices during code reviews by spotting insecure patterns and suggesting safer alternatives.

  • Escalate complex issues to the central security team when a problem exceeds their expertise or requires broader authority.

  • Advocate for security tooling that integrates into existing workflows, ensuring that security tools help rather than hinder development velocity.

Day-to-day activities

On a typical sprint, a security champion might start by reviewing prioritized scan results for their team's repositories and helping route fixes to the appropriate code owners, including handling obvious false positives when they arise. During standups, they might flag a security requirement for a new feature or answer a teammate's question about how to securely manage a new API key. If a high-priority vulnerability is discovered, the champion doesn't necessarily fix it themselves; instead, they route the finding to the specific owner of that code and help them understand why it needs immediate attention.

See for yourself...

Learn about the full power of the Wiz cloud security platform. Built to protect your cloud environment from code to runtime.

How to build a security champions program

A champion without a structured program is often just an overloaded developer who eventually burns out. To succeed long-term, security champion initiatives require formal structure, consistent support, and the right tooling. Organizations must treat this as a formal program rather than a casual volunteer effort.

1. Define the role and expectations

The most critical step is defining exactly what the champion is expected to do and how much time it should take. A common failure mode occurs when roles are undefined, leading champions to abandon the responsibility within a year due to conflicting priorities. Expectations regarding time commitment (typically 10-20% of their role) must be documented and explicitly agreed upon by both the champion and their engineering manager.

2. Identify and nominate champions

When selecting champions, look for developers who demonstrate curiosity about how things break, not necessarily those who are already security experts. It is generally recommended to have one champion per team or squad to ensure adequate coverage without overloading any single individual. While voluntary programs ensure enthusiasm, nominated approaches ensure coverage; a hybrid approach often works best where managers nominate candidates who then opt-in.

3. Provide training and enablement

Champions need foundational knowledge to be effective, including understanding the OWASP Top 10, secure coding basics, and threat modeling fundamentals. However, abstract theory is not enough; platform-specific training on the actual tools they will use daily is equally important. The OWASP Security Champions Guide serves as an excellent resource for structuring these training frameworks.

4. Give champions the right tooling and access

This is where many programs fail: champions are often given access to security tools that flood them with organization-wide noise. Champions need scoped visibility into their own team's risk, supported by Role-Based Access Control (RBAC) that maps to team boundaries and project ownership. They need prioritized findings with context, not raw scanner output containing thousands of irrelevant alerts. In practice, the best tooling for champions doesn't just list findings; it explains why each issue matters in production by connecting exposure, permissions, and reachable data. ServiceNow, for example, successfully scaled their program by providing specific tools and training that empowered champions to act autonomously.

5. Establish communication channels

Champions should never feel isolated; they need a community of peers and direct access to security expertise. Successful programs establish regular syncs with central security, dedicated Slack channels, and clear escalation paths for difficult problems. Bouygues Telecom utilized RBAC to give teams autonomy while maintaining open lines of communication, integrating security directly into their existing workflows.

6. Recognize and reward contributions

To maintain engagement, programs must recognize the value champions provide through gamification, career growth opportunities, and public visibility. Serving as a security champion can be a significant career accelerator for developers interested in broadening their skillset. AWS recommends structuring these programs with clear tiers and rewards to maintain motivation over time.

What makes security champions effective in cloud environments

Cloud-native development introduces complexity that traditional security champion models were not designed to handle. Ephemeral infrastructure, Infrastructure as Code (IaC), containers, serverless functions, and AI-assisted development all change the landscape of risk. Champions in these environments need tools and knowledge adapted to this dynamic reality.

Contextual prioritization over alert volume

Champions will quickly tune out if they are forced to drown in raw scanner output. Champions need findings that follow risk-based vulnerability management principles, correlated with runtime exposure, identity permissions, and data access. Champions are most effective when they can see attack paths (how an issue could actually be exploited) instead of treating vulnerabilities, misconfigurations, and identity as separate queues. For example, a critical CVE on an isolated container with no network exposure and read-only permissions is lower priority than a medium-severity vulnerability on a public-facing API server that has an overly permissive IAM role granting write access to a customer data bucket. The second scenario creates an exploitable attack path; the first does not. With hundreds of thousands of CVEs now cataloged (see: over 240,000 CVE Records as of 2024), tooling must show attack paths, not just vulnerability lists, to help champions make smart decisions.

Scoped visibility for each team

Champions need a view of their own team's infrastructure, not the entire organization's cloud estate. Security tools must support project-based access controls that map cloud resources directly to engineering teams. This allows champions to see exactly what their squad owns and filter out the noise generated by other teams' infrastructure.

Shift-left integration in developer workflows

Champions are most effective when security findings appear where developers already work, such as in the IDE, pull request, or CI/CD pipeline. Findings that surface in a separate console requiring a separate login drastically reduce adoption and remediation speed, undermining shift-left security practices. Integration with existing tools like GitHub, GitLab, Jira, and Slack reduces friction and makes security a natural part of the development lifecycle.

Common pitfalls in security champion programs

Many organizations launch security champion programs with high energy, only to see them quietly die within a year. Understanding the common failure modes is essential to avoiding them.

  • Treating champions as unpaid security staff: Champions still have primary development responsibilities; overloading them with security work leads to burnout.

  • Giving champions all alerts with no prioritization: Raw scanner output creates alert fatigue and makes the role feel pointless and administrative.

  • No executive sponsorship: Without leadership support, champions lack the authority to influence team priorities or reserve time for security tasks.

  • No feedback loop with central security: Champions need to see that their escalations are acted upon; one-way communication kills engagement.

  • No dedicated time allocation: Programs that rely on champions volunteering extra time without manager buy-in typically fail within a year.

How to measure security champion program success

Programs without metrics cannot demonstrate value to leadership or identify areas that need improvement. Measuring success requires tracking both risk reduction and program health.

Risk outcome metrics

  • Mean time to remediation (MTTR): Compare champion-owned applications to non-champion teams

  • Reduction in internet-exposed critical findings: Track month-over-month decrease in externally reachable vulnerabilities

  • Attack path reduction: Measure decrease in exploitable paths to sensitive data or admin access

  • Patch SLA attainment: Percentage of exploitable vulnerabilities remediated within defined timeframes

  • Pre-production catch rate: Security findings caught in CI/CD versus discovered post-deployment

Program health metrics

  • Champion retention rate: Percentage of champions who remain in the role after 12 months

  • Team coverage: Percentage of development teams with an active champion

  • Training completion: Percentage of champions who completed onboarding and ongoing education

  • Engagement metrics: Meeting attendance, findings triaged per sprint, issues escalated

  • Developer satisfaction: Survey scores on security process friction and tooling usability

It is important to note that qualitative measures, such as developer sentiment and champion retention rates, matter just as much as quantitative metrics in assessing the long-term health of the program.

Security champions vs. security engineers

It is vital to clarify the distinction between these two roles to avoid confusion and friction. Security champions are embedded developers with security responsibilities, while security engineers are dedicated security professionals. Champions escalate complex issues to engineers; they do not replace them.

AspectSecurity ChampionSecurity Engineer
Primary roleDeveloper/engineerSecurity professional
Time allocation10-20% security100% security
ScopeSingle team or applicationOrganization-wide
ExpertiseFoundational security knowledgeDeep security expertise
ReportingEngineering managerSecurity leadership

Wiz's approach to enabling security champions

Wiz supports security champion programs by directly addressing the core challenges of visibility, prioritization, and workflow integration. By using code-to-cloud context that connects code findings to runtime exposure, identity permissions, and data access, organizations can empower champions to act effectively without requiring deep security expertise.

  • Contextual prioritization through the Security Graph: Wiz uses the Security Graph to show champions how vulnerabilities, misconfigurations, identity permissions, and data exposure connect to form actual attack paths. This allows champions to explain risk to developers using visual context, such as "this vulnerability is exposed to the internet, has admin permissions, and can reach customer data,"rather than just citing abstract CVE numbers.

  • Role-based project views: Wiz enables project-based access controls that give champions visibility into exactly what their team owns. This scoped view filters out noise from other teams' infrastructure, ensuring champions stay focused on the risks they can actually control and remediate.

  • Wiz Code and CI/CD integration: Security findings from Wiz embed directly into developer workflows, including IDEs, pull requests, and pipelines. This allows champions to catch issues before deployment without adding manual steps or forcing developers to log into separate tools.

  • Remediation guidance: Wiz provides clear remediation guidance and context that champions can hand directly to developers, accelerating time to resolution without requiring champions to research every vulnerability themselves.

Get a demo to see how security champions can prioritize real production risk with code-to-cloud context.

See for yourself...

Learn what makes Wiz the platform to enable your cloud security operation

For information about how Wiz handles your personal data, please see our Privacy Policy.