Security Champions Program: Scaling AppSec Across Engineering Teams
How to build a security champions program that scales application security across engineering teams — structure, champion selection, training curriculum, and metrics.
Security Champions Program: Scaling AppSec Across Engineering Teams
A security team of two cannot comprehensively review every pull request, attend every design meeting, and respond to every developer question across ten engineering squads. Application security doesn't scale through headcount alone — it scales through culture, and the operational mechanism for that culture is a security champions program.
Security champions are engineers embedded within product teams who act as the local security subject matter expert. They're not dedicated security personnel — they spend 10–20% of their time on security-related work and the rest on their normal engineering responsibilities. But their presence in daily engineering conversations produces a multiplier effect that a centralized security team cannot replicate.
What a Security Champions Program Actually Is
A security champions program formalizes the relationship between the central security function and its distributed ambassadors across engineering. At its core, it's:
- A network of engineers who have opted in to deeper security engagement
- A training curriculum that gives them relevant skills and current threat awareness
- A community where champions share knowledge, ask questions, and support each other
- A recognition structure that makes the role valuable for career development
- Clear responsibilities that define what champions are expected to do (and not do)
What it is not: a mechanism to offload security responsibility from the security team onto engineers without support. Champions enhance security coverage — they don't replace security engineers.
Designing the Program Structure
Governance Model
The program needs an owner in the security organization — a Security Engineering Manager or AppSec lead — who is responsible for champion training, community management, and measuring program effectiveness. Without a dedicated owner, champion programs decay as security team priorities shift.
Define the governance structure explicitly:
- Champion responsibilities: Code review assistance, threat modeling participation, security testing for their team's features, escalation path for security questions
- Security team responsibilities: Training content, tooling support, escalation handling, quarterly curriculum updates
- Manager responsibilities: Protecting 10–20% of champion time for security activities, including security performance in reviews
Getting explicit manager buy-in before launching is essential. Champions who volunteer but whose managers deprioritize security work will quietly stop participating within two quarters.
Champion Selection Criteria
Security champions should be identified, not just solicited. Broad volunteer solicitation tends to attract either the most junior engineers (keen to learn but lack the team credibility to influence design decisions) or the most senior engineers (credible but often too busy to stay engaged).
Look for engineers who:
- Have existing security interest: Track record of raising security concerns in code reviews, asking security questions, or self-directed security learning
- Are technically credible in their team: Their opinions are weighted by peers. A security champion who can't get traction in design discussions doesn't scale security influence.
- Communicate well: Champions translate security concepts for non-security audiences constantly. Writing and verbal communication matter.
- Are mid-level to senior: Experienced enough to have design conversations, not so senior that they're pulled in too many directions
Aim for one champion per engineering team or squad (5–10 engineers). Smaller ratios produce better engagement; larger ratios mean champions are spread too thin.
Incentive Structure
Champions should receive something tangible for the additional scope. Options:
- Title recognition: "Security Champion" as an explicit part of their title or LinkedIn profile
- Career development framing: Documented in performance reviews. Security depth is a promotable skill. Make this explicit in your promotion criteria.
- Access to security conferences and training: Black Hat, DEF CON, and BSides attendance or training budget that non-champions don't receive
- Early access and input: Champions are consulted on new security tooling, policies, and program decisions. The role gives them influence, which is intrinsically motivating for engaged engineers.
- Recognition in org-wide communications: Publicly credit champion contributions in engineering all-hands, newsletters, or team updates
Training Curriculum
Champion training has two components: foundational skills and ongoing knowledge currency.
Foundational Curriculum (First 90 Days)
The foundational curriculum should take a new champion from "security-curious" to "security-capable" for their specific engineering context. Recommended modules:
Module 1: Threat Modeling How to run a threat model for a system they've designed. Cover STRIDE methodology, data flow diagrams, trust boundary identification, and how to prioritize findings. Practical exercise: run a threat model on a real system they own.
Module 2: OWASP Top 10 in Context Not a lecture on OWASP Top 10 in the abstract — a deep dive into how each vulnerability class manifests in the technology stack they use daily. If your backend is Node.js, focus on injection patterns in MongoDB queries, JWT vulnerabilities, and prototype pollution. If your frontend is React, focus on XSS via dangerouslySetInnerHTML and CSP configuration.
Module 3: Secure Code Review How to review code for security issues. What patterns to look for, how to use SAST output effectively, and how to give constructive security feedback in code reviews without creating adversarial dynamics.
Module 4: Dependency and Supply Chain Security How to read SAST/SCA scan output, understand CVE severity ratings, and make triage decisions. What makes a transitive dependency vulnerability actually exploitable vs. theoretical.
Module 5: Incident Response Basics What to do when something goes wrong. Recognition signals, escalation path, evidence preservation, and communication during an incident. Champions are often the first responder for their team.
Ongoing Training (Monthly)
Keep champions current with brief, focused monthly sessions:
- Threat intelligence: What attacks are targeting your industry right now? Monthly briefing on relevant CVEs, breach reports, and attack trends.
- Tooling updates: New SAST rules, new scanning tools, changes to security tooling in CI/CD.
- Case studies: Real-world incidents and what they teach. The post-mortems from major SaaS breaches are rich teaching material.
- Guest presentations: External security researchers, conference talk recaps, vendor briefings on emerging threats.
Keep sessions to 30–45 minutes maximum. Champions are giving discretionary time — respect it.
Community and Knowledge Sharing
A champions program that is only training is a certification program. The community aspect is what makes it durable.
Dedicated communication channel (Slack or Teams): A space where champions ask questions, share findings, and discuss security topics in their day-to-day work. The security team should be active participants, not just observers.
Monthly champion sync: 45-minute call where champions share what security work happened in their teams that month, raise cross-cutting issues, and get updates from the security team. Keep it practical and conversational, not a status meeting.
Champion wiki: A living knowledge base where champions document common vulnerabilities they've found, remediation patterns, approved security libraries, and answers to recurring questions. This compound asset grows in value over time.
Cross-team collaboration on complex issues: When a security question cuts across multiple teams (a new authentication pattern, a shared service with security implications), pull champions from affected teams into a working group rather than having the security team decide in isolation.
Metrics and Program Health
Measure both program activity and security outcomes to understand whether champions are making a difference.
Activity metrics:
- Number of active champions vs. total enrolled (active = participated in training or community in last 60 days)
- Training completion rates per module
- Monthly channel activity in champion Slack channel
- Security reviews initiated by champions (threat models, design reviews)
Outcome metrics:
- Vulnerabilities found in code review by champions vs. post-production findings (shift-left ratio)
- Mean time to triage security findings for teams with champions vs. without
- Security debt accumulation rate: are teams with champions introducing fewer new vulnerabilities over time?
- SAST finding resolution rate for champion teams vs. non-champion teams
Annual champion survey: Ask champions directly — is the program adding value to your work? Do you feel supported? What should change? Act on the results visibly.
Common Failure Modes
No manager protection of champion time: Champions volunteer but managers treat security activities as optional. The 10–20% time commitment disappears under sprint pressure. Solve this at program launch with explicit manager agreement and leadership support.
Champion as security gatekeeper: Some champions interpret their role as blocking insecure code rather than enabling secure code. This creates adversarial relationships with teammates. Train champions on enablement over gatekeeping.
No feedback loop to the security team: Champions identify patterns — the same vulnerable pattern appearing in multiple PRs, a missing library for a common security operation — but have no mechanism to surface systemic issues to the security team. Build explicit escalation and feedback channels.
Training without application: A curriculum without practical application produces knowledge, not skill. Every training module should include a real exercise, a tool the champion uses immediately, or a concrete task for their team.