<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Leonard Esere</title>
    <description>The latest articles on DEV Community by Leonard Esere (@leonardesere).</description>
    <link>https://dev.to/leonardesere</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3771863%2Fd010cbbc-b426-49d0-9bc5-afbb64568560.jpeg</url>
      <title>DEV Community: Leonard Esere</title>
      <link>https://dev.to/leonardesere</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/leonardesere"/>
    <language>en</language>
    <item>
      <title>I Built an Autonomous Cloud Engineer That Actually Fixes Your Infrastructure</title>
      <dc:creator>Leonard Esere</dc:creator>
      <pubDate>Sat, 07 Mar 2026 17:45:25 +0000</pubDate>
      <link>https://dev.to/leonardesere/i-built-an-autonomous-cloud-engineer-that-actually-fixes-your-infrastructure-4fig</link>
      <guid>https://dev.to/leonardesere/i-built-an-autonomous-cloud-engineer-that-actually-fixes-your-infrastructure-4fig</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffa1vx2syf8fxu6ic48v2.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffa1vx2syf8fxu6ic48v2.jpg" alt=" " width="800" height="508"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhwft8w950i8u296s8aki.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhwft8w950i8u296s8aki.jpg" alt=" " width="800" height="538"&gt;&lt;/a&gt;&lt;strong&gt;TLDR:&lt;/strong&gt; After 12 years in DoD and DoE environments watching the same security violations get detected, ticketed, and ignored for weeks, I built PolicyCortex -- an AI agent that does not just alert you about problems in your cloud infrastructure. It fixes them. In production. With a full audit trail.&lt;/p&gt;


&lt;h2&gt;
  
  
  The Problem
&lt;/h2&gt;

&lt;p&gt;Here is what cloud security looks like at most organizations right now:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;A scanner finds a public-facing storage account with sensitive data.&lt;/li&gt;
&lt;li&gt;It fires an alert into your CSPM tool -- Wiz, Prisma Cloud, take your pick.&lt;/li&gt;
&lt;li&gt;That alert becomes a ticket in ServiceNow.&lt;/li&gt;
&lt;li&gt;The ticket sits in a queue for 6-14 days.&lt;/li&gt;
&lt;li&gt;Meanwhile, your infrastructure is exposed.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;That is not a tooling problem. It is an architecture problem.&lt;/p&gt;

&lt;p&gt;I spent 12 years in Department of Defense and Department of Energy environments. The stakes there are not abstract. A misconfigured storage account is not just a compliance checkbox -- it is a potential national security incident. And yet even in those environments, the workflow was the same: detect, alert, ticket, wait.&lt;/p&gt;

&lt;p&gt;When I left government work and started looking at what enterprise cloud teams were dealing with, I found the same dysfunction at scale. The average organization runs 4-7 separate tools to cover security posture, compliance, cost management, observability, and change management. None of them talk to each other meaningfully. Every one of them generates output for humans to act on. The bottleneck is always the human queue.&lt;/p&gt;

&lt;p&gt;The problem is not that organizations lack visibility. They have too much visibility. What they lack is &lt;em&gt;action&lt;/em&gt;.&lt;/p&gt;


&lt;h2&gt;
  
  
  What I Built
&lt;/h2&gt;

&lt;p&gt;PolicyCortex is an autonomous cloud engineer. It does not generate alerts. It generates outcomes.&lt;/p&gt;

&lt;p&gt;The system connects to your cloud environment, continuously monitors for security violations, compliance gaps, and cost anomalies, and -- where authorized -- remediates them automatically. The full audit trail is generated as part of execution, not as an afterthought.&lt;/p&gt;

&lt;p&gt;To be specific about what "autonomous" means here: PolicyCortex operates in two modes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Autonomous Mode&lt;/strong&gt; executes approved remediation patterns without human intervention. You define the policy; the system executes against it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Gated Mode&lt;/strong&gt; pauses before any write operation and presents an AWAITING APPROVAL prompt with the exact API call it intends to make, the resources affected, and the compliance controls it will satisfy. You approve or skip. Nothing touches your infrastructure without the intent being explicit.&lt;/p&gt;

&lt;p&gt;This is the architecture I would have wanted in a DoD environment. Full automation where trust is established. Human-in-the-loop where it is not. No surprises.&lt;/p&gt;


&lt;h2&gt;
  
  
  How It Works Under the Hood
&lt;/h2&gt;

&lt;p&gt;Let me walk through a real remediation flow. This is not a sanitized demo. This is what the system actually executes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The trigger:&lt;/strong&gt; PolicyCortex detects a public storage account in a production Azure subscription.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;ALERT [CRITICAL]
Type:     Public storage account detected
Resource: stprod-customer-data
Scope:    Production subscription
Action:   Initiating autonomous remediation
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;From that trigger, the system executes 8 steps in roughly 3 minutes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1 -- Authenticate&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight http"&gt;&lt;code&gt;&lt;span class="err"&gt;POST https://login.microsoftonline.com/{tenant}/oauth2/token
Body: grant_type=client_credentials
      client_id={service_principal}
      scope=https://management.azure.com/.default
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;PolicyCortex authenticates against Azure Resource Manager using a scoped service principal. The principle of least privilege applies here -- the service principal has exactly the permissions required for remediation, nothing more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2 -- Read current configuration&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight http"&gt;&lt;code&gt;&lt;span class="err"&gt;GET https://management.azure.com/subscriptions/{sub}/resourceGroups/{rg}/
    providers/Microsoft.Storage/storageAccounts/stprod-customer-data
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Before touching anything, the system reads the current state. It checks allowBlobPublicAccess, networkAcls, encryption, and minimumTlsVersion. This snapshot becomes part of the audit trail and is used to validate the post-remediation state.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3 -- Disable public blob access&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight http"&gt;&lt;code&gt;&lt;span class="err"&gt;PATCH https://management.azure.com/subscriptions/{sub}/resourceGroups/{rg}/
      providers/Microsoft.Storage/storageAccounts/stprod-customer-data

{
  "properties": {
    "allowBlobPublicAccess": false
  }
}
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;[WRITE] allowBlobPublicAccess: true -&amp;gt; false
[VERIFIED]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 4 -- Create private endpoint&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight http"&gt;&lt;code&gt;&lt;span class="err"&gt;PUT https://management.azure.com/subscriptions/{sub}/resourceGroups/{rg}/
    providers/Microsoft.Network/privateEndpoints/pe-stprod-data

{
  "properties": {
    "subnet": { "id": "/subnets/snet-data" },
    "privateLinkServiceConnections": [{
      "groupIds": ["blob"],
      "privateLinkServiceId": "/storageAccounts/stprod-customer-data"
    }]
  }
}
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;[WRITE] Private endpoint created: pe-stprod-data
        Subnet: snet-data
        DNS zone: privatelink.blob.core.windows.net
[VERIFIED]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 5 -- Update Network Security Group&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight http"&gt;&lt;code&gt;&lt;span class="err"&gt;PUT https://management.azure.com/.../networkSecurityGroups/{nsg}/securityRules/DenyAllInternetOutbound

{
  "properties": {
    "priority": 4096,
    "direction": "Outbound",
    "access": "Deny",
    "protocol": "*",
    "destinationAddressPrefix": "Internet"
  }
}
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;[WRITE] NSG rule added: DenyAllInternetOutbound (priority 4096)
[VERIFIED]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 6 -- Verify encryption at rest&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight http"&gt;&lt;code&gt;&lt;span class="err"&gt;GET https://management.azure.com/.../storageAccounts/stprod-customer-data/encryptionScopes
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Encryption:     AES-256
Blob service:   enabled
Key source:     Microsoft.Storage
TLS minimum:    TLS1_2
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;No write operation here. This is a verification pass. If encryption were not configured correctly, the system would pause and escalate rather than proceed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 7 -- Run compliance check&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Compliance evaluation:
  CMMC SC.3.177  [PASS] - Data encryption in transit and at rest
  NIST SC-28     [PASS] - Protection of information at rest
  SOC 2 CC6.1   [PASS] - Logical and physical access controls
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This is where the compliance automation pays off. The remediation did not just fix a configuration problem. It generated verified evidence for three control frameworks simultaneously.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 8 -- Audit trail entry&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"remediation_id"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"rem-20260307-0842"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"resource"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"stprod-customer-data"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"triggered_by"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"policy:PUBLIC_STORAGE_CRITICAL"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"executed_by"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"policycortex-agent-v2"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"duration_seconds"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mi"&gt;187&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"write_operations"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mi"&gt;4&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"controls_satisfied"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"CMMC-SC.3.177"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"NIST-SC-28"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"SOC2-CC6.1"&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"pre_state_snapshot"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{},&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"post_state_snapshot"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{},&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"verified"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Remediation complete
8 steps executed | 4 write operations verified | 3 compliance controls satisfied
Time to remediation: 3 minutes 7 seconds
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Compare that to 6-14 days in a traditional ticket-based workflow.&lt;/p&gt;




&lt;h2&gt;
  
  
  Beyond Remediation
&lt;/h2&gt;

&lt;p&gt;Security remediation is the core capability, but it is not the only one. A few other things the system handles:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;FinOps Intelligence&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;PolicyCortex tracks cloud spend against budget in real time and identifies optimization opportunities. The current dashboard shows $185.73 in current spend against an $8,000 monthly budget -- but more importantly, $1,175 in savings achieved this month through automated rightsizing and waste elimination, with next-month spend forecast at $218.67. That forecast is generated from usage trend analysis, not guesswork.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AI Observability&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;As organizations run more AI workloads, model inference costs have become a meaningful line item that most FinOps tools are not built to track. PolicyCortex surfaces AI model spend by provider -- currently $15,420 this month across OpenAI (56.7%), internal ML infrastructure (20.7%), and Azure Cognitive Services (12.1%) for a sample enterprise deployment. When a model cost profile changes unexpectedly, you want to know before the invoice arrives.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Natural Language Operations&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Infrastructure operations should not require memorizing API syntax. PolicyCortex accepts natural language instructions:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;"Tag all Dev VMs with Environment=Development"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The system parses intent, identifies 487 affected resources, shows you a preview, and executes on confirmation. The same pattern works for policy queries, compliance checks, and bulk operations across resource groups.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ATO Automation&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For organizations pursuing federal authorizations -- FedRAMP Moderate, CMMC L2/L3, NIST SP 800-171 -- the evidence collection burden alone can take months. PolicyCortex maintains continuous control evidence across 14 control domains. CMMC L2 covers 110 controls. CMMC L3 covers 130. FedRAMP Moderate maps 325 controls. Evidence is generated as a byproduct of normal operations, not as a separate audit exercise.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why Not Just Use Existing Tools?
&lt;/h2&gt;

&lt;p&gt;The honest answer is: the existing tools were built to sell visibility, not action.&lt;/p&gt;

&lt;p&gt;CSPM tools (Wiz, Prisma Cloud) are excellent at finding problems. They are not built to fix them. Their output is a findings report that feeds a human workflow.&lt;/p&gt;

&lt;p&gt;Cloud management platforms (CloudHealth, Apptio) are strong on cost analytics. They tell you what to optimize. The optimization itself is manual.&lt;/p&gt;

&lt;p&gt;Observability platforms (Datadog, Dynatrace) give you metrics and traces. They do not touch your infrastructure configuration.&lt;/p&gt;

&lt;p&gt;ITSM platforms (ServiceNow) are designed to manage human workflows. They are the queue where alerts go to wait.&lt;/p&gt;

&lt;p&gt;Each of these tools does its job. The problem is the seams between them -- the handoffs, the context loss, the ticket lag. PolicyCortex is not trying to be a better CSPM or a better FinOps tool. It is trying to be what none of them are: an agent that closes the loop from detection to remediation without requiring a human to operate every step.&lt;/p&gt;

&lt;p&gt;That said, PolicyCortex integrates with these tools rather than demanding you rip them out. If your team is invested in Datadog for observability, PolicyCortex can ingest signals from it. If ServiceNow is your system of record, remediation actions can be logged there. The goal is to reduce the number of tools you need, not create a migration crisis.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Hard Parts
&lt;/h2&gt;

&lt;p&gt;I want to be honest about what is difficult here.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Trust calibration is a real problem.&lt;/strong&gt; The hardest product decision was figuring out what the system should do autonomously versus what it should gate. Too conservative and you have an expensive alert tool. Too aggressive and you have an outage risk. The current model uses a combination of violation severity, resource criticality tags, change window schedules, and explicit policy rules to decide. It is not perfect and I expect this to evolve significantly based on how teams actually use it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud APIs are inconsistent.&lt;/strong&gt; Azure, AWS, and GCP each have their own resource models, authentication patterns, and eventually-consistent behavior. A remediation that works cleanly in Azure takes a different implementation in AWS. The abstraction layer that makes natural language operations possible is non-trivial to maintain across providers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Compliance mapping is genuinely complex.&lt;/strong&gt; CMMC L3 and FedRAMP Moderate share significant overlap but are not identical. Mapping a single infrastructure control to the right framework requirements, and doing it accurately enough that the evidence is actually usable in an audit, requires domain knowledge that is hard to encode. I spent a meaningful portion of my DoD career doing this by hand. Automating it correctly took longer than any other part of the system.&lt;/p&gt;




&lt;h2&gt;
  
  
  What is Next
&lt;/h2&gt;

&lt;p&gt;A few things I am actively working on:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Multi-cloud remediation parity.&lt;/strong&gt; Azure is production-ready today. AWS support is in private beta. GCP is on the roadmap.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Remediation playbook library.&lt;/strong&gt; Right now, remediation logic is built into the system. I am working on a public playbook format so teams can write, share, and audit their own remediation patterns.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Drift detection and rollback.&lt;/strong&gt; If a human makes a manual change that puts a resource out of policy, PolicyCortex should detect the drift and either alert or re-remediate depending on policy. Rollback of PolicyCortex own operations is also something I want to make first-class.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Compliance report generation.&lt;/strong&gt; Right now the evidence exists in structured logs. Generating a human-readable FedRAMP package or CMMC assessment report from that evidence is the next step.&lt;/p&gt;




&lt;h2&gt;
  
  
  Try It
&lt;/h2&gt;

&lt;p&gt;If you are running production workloads in Azure and you are tired of security findings sitting in queues while your infrastructure stays exposed, I want you to try this.&lt;/p&gt;

&lt;p&gt;Visit &lt;a href="https://policycortex.com" rel="noopener noreferrer"&gt;policycortex.com&lt;/a&gt; to request early access. I am working directly with the first cohort of users and I will take every piece of feedback seriously.&lt;/p&gt;

&lt;p&gt;If you have questions about the architecture, the compliance automation, or the design decisions behind gated versus autonomous mode -- drop them in the comments. I have been heads-down building this for a while and I am genuinely interested in what resonates and what does not with people who live in cloud infrastructure every day.&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>devops</category>
      <category>security</category>
      <category>azure</category>
    </item>
    <item>
      <title>The Death of CSPM: Why Finding Cloud Issues Isn’t Enough Anymore</title>
      <dc:creator>Leonard Esere</dc:creator>
      <pubDate>Tue, 17 Feb 2026 03:03:47 +0000</pubDate>
      <link>https://dev.to/leonardesere/the-death-of-cspm-why-finding-cloud-issues-isnt-enough-anymore-1ck5</link>
      <guid>https://dev.to/leonardesere/the-death-of-cspm-why-finding-cloud-issues-isnt-enough-anymore-1ck5</guid>
      <description>&lt;p&gt;Your CSPM found 847 critical issues this month. You fixed 12. The math doesn’t work—and it’s not your fault.&lt;/p&gt;

&lt;p&gt;I’ve spent the last 4 years in some of the most secure environments in the world: Los Alamos National Laboratory, MITRE Corporation, a major defense contractor. I’ve watched the best security teams drown in alerts while auditors asked for evidence that didn’t exist.&lt;/p&gt;

&lt;p&gt;The problem isn’t alert fatigue. It’s that we built an entire industry around FINDING cloud issues, not FIXING them.&lt;/p&gt;

&lt;h2&gt;
  
  
  The CSPM Model Is Broken
&lt;/h2&gt;

&lt;p&gt;Cloud Security Posture Management tools follow a simple model:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Scan everything&lt;/li&gt;
&lt;li&gt;Alert on everything&lt;/li&gt;
&lt;li&gt;Hope someone fixes something&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Reality: Security teams review less than 5% of alerts. The rest accumulate in backlogs, waiting to become incidents.&lt;/p&gt;

&lt;p&gt;Meanwhile:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Compliance teams spend 6 weeks manually collecting evidence for audits&lt;/li&gt;
&lt;li&gt;Finance gets surprise Azure OpenAI bills with zero visibility into what caused them&lt;/li&gt;
&lt;li&gt;Platform engineers juggle 6+ tools that don’t talk to each other&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The gap between identification and remediation—that’s where security incidents happen. That’s where compliance failures occur. That’s where money is wasted.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Real Governance Looks Like
&lt;/h2&gt;

&lt;p&gt;Real governance means:&lt;/p&gt;

&lt;p&gt;✔ Making decisions automatically&lt;br&gt;
✔ Documenting every action&lt;br&gt;
✔ Self-healing before incidents&lt;br&gt;
✔ Continuous compliance evidence&lt;/p&gt;

&lt;p&gt;Not quarterly scans. Not manual POA&amp;amp;Ms. Not “we’ll get to it next sprint.”&lt;/p&gt;

&lt;h2&gt;
  
  
  The PolicyCortex Approach
&lt;/h2&gt;

&lt;p&gt;I left Los Alamos 18 months ago to build something different. Not a better scanner—an autonomous governance system.&lt;/p&gt;

&lt;h3&gt;
  
  
  Phase 1: Shadow Mode
&lt;/h3&gt;

&lt;p&gt;Before touching production, Xovyr (our AI engine) observes and suggests. You see what it would do, validate its reasoning, build confidence. No production changes. Just intelligence.&lt;/p&gt;

&lt;h3&gt;
  
  
  Phase 2: Digital Twin Simulation
&lt;/h3&gt;

&lt;p&gt;Before any production change, we simulate it. See the impact. Validate the outcome. Approve with confidence.&lt;/p&gt;

&lt;h3&gt;
  
  
  Phase 3: Self-Healing with Rollback
&lt;/h3&gt;

&lt;p&gt;Xovyr executes with validation. If something goes wrong, automatic rollback. Safety built into every action.&lt;/p&gt;

&lt;h2&gt;
  
  
  Beyond Security
&lt;/h2&gt;

&lt;p&gt;PolicyCortex isn’t just about fixing misconfigurations. It’s a complete governance platform:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Full ATO/CMMC Automation&lt;/strong&gt;: Evidence collection, SSP generation, POAM tracking, FedRAMP package assembly&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AI Observability&lt;/strong&gt;: Token-level cost attribution for Azure OpenAI&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Unified Policy Engine&lt;/strong&gt;: OPA + Steampipe + Cloud Custodian in one interface&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Natural Language Command Center&lt;/strong&gt;: Ask questions, get answers, take action&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Built by Practitioners
&lt;/h2&gt;

&lt;p&gt;Our team has been in the trenches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Los Alamos National Lab (DoE Q clearance)&lt;/li&gt;
&lt;li&gt;MITRE Corporation (DoD Secret clearance)&lt;/li&gt;
&lt;li&gt;USAA (financial services compliance)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We’ve written SSPs at 2 AM. We’ve scrambled for audit evidence. We’ve explained surprise cloud bills to finance. PolicyCortex is the platform we wished existed.&lt;/p&gt;

&lt;h2&gt;
  
  
  What’s Next
&lt;/h2&gt;

&lt;p&gt;We’re launching with a design partner program. Looking for 10 organizations—government contractors, regulated enterprises, AI-forward companies—who want to shape the future of autonomous governance.&lt;/p&gt;

&lt;p&gt;If you’re tired of managing alerts and ready to start governing, we’d love to talk.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://policycortex.com" rel="noopener noreferrer"&gt;https://policycortex.com&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;What’s your alert-to-fix ratio? And how do you handle the backlog?&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cloudsecurity</category>
      <category>devops</category>
      <category>compliance</category>
      <category>ai</category>
    </item>
  </channel>
</rss>
