Digitalisation World - ISSUE VII 2021

Page 22

CYBERSECURITY

Common misconceptions around

cloud-native security

The most crucial part of any cloud native journey is learning about cloud native security early on in the process. BY RANI OSNAT, VP STRATEGY AT AQUA SECURITY ADOPTION RATES for cloud native application architectures are rising quickly within enterprises, and for good reason. Portability, scalability and efficient resource utilisation are commonly cited benefits, but the greatest boon is the significantly reduced deployment times enabled through a cloud native approach. A cloud native approach gives organisations far more flexibility and control over the infrastructure they use, enabling faster workflows and deployment processes. This goes some way to explaining why the number of containers in production has jumped 300% since 2016. However, don’t let these numbers fool you. Although cloud native is gaining a

foothold within businesses, there is still a lack of cloud native experience within many development teams, and a lot of common misconceptions, particularly regarding security. Misconception #1 – We don’t need a specific cloud native security strategy The separation of discrete computing components in containers, alongside concepts like immutability, provide the impression (at least at first glance) that cloud native applications are, by their very nature, secure. This is one of the most common misconceptions we see, and quite a dangerous one at that. It is, of course, convenient to assume that containers ‘contain’ and are segregated from other containers and the OS they’re running on. But the truth is not so simple. If one runs a container with root privileges, that container could potentially access all the resources on the host, opening up the possibility for an attacker to take over that host. Privileged access must be controlled before the container is deployed and re-checked using cloud native runtime enforcement capabilities. Embedding cloud native security into cloud native initiatives can make applications and infrastructure more secure, and microservices running in containers or as serverless functions, provide ways to limit exposure. However, a cloud native deployment without a security strategy does not necessarily enjoy full protection, and security teams must still set policies across the build, cloud infrastructure and running workloads.

22

WWW.DIGITALISATIONWORLD.COM

l

ISSUE VII 2021

l

COPYRIGHT DIGITALISATION WORLD


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Providing reliable, long term SaaS services The importance of scalability

28min
pages 70-79

How is the cloud encouraging hyperautomation, and why should I care?

6min
pages 68-69

How data is changing the way hotels streamline operations

5min
pages 60-61

Delivering deep-link analysis

6min
pages 62-63

How to navigate intellectual property risk in blockchain projects

5min
pages 56-57

Don’t wait for blockchain, it’s more accessible than you think

5min
pages 54-55

Blockchain vs Bitcoin Everything you need to know

13min
pages 48-53

Five practical ways contact centres can use AI to create value

9min
pages 44-47

Machine Learning success starts with 10 steps

6min
pages 42-43

How is QKD combatting the increased sophistication of today’s cyber-attacks?

4min
pages 38-39

How mass remote work has changed DDoS

5min
pages 40-41

A three-pronged approach to government security

3min
pages 36-37

How to develop and maintain an effective DevSecOps culture

7min
pages 32-35

A question of priorities

4min
pages 24-25

Delivering an effective cybersecurity strategy

5min
pages 20-21

Common misconceptions around cloud native security

4min
pages 22-23

Covid - the ultimate digital test?

2min
page 10

Strong growth for the managed edge services market

10min
pages 16-19

Average phishing costs soar to $14.8m

2min
page 11

Over a third of organisations worldwide experience ransomware attack or breach

3min
pages 14-15

AI spend to reach almost $342 billion this year

4min
pages 12-13

Digital darkness across Europe

4min
page 8

Security and silos hold back automation initiatives

2min
page 9

90% enterprises yet to achieve digital-first goals

3min
page 6
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.