Page 54 - Security Today, July/August 2022
P. 54

Professional
Recommendations
The cloud is reasonably secure but there are opportunities for exploitation By Roni Osnat
Digital transformation is changing the way we do business and COVID-19 accelerated this shift. Organizations that had not already moved data to the cloud, rushed to do it, while others acceler- ated their shift from on-premise to cloud. With the shift from onsite to offsite, developers embraced cloud-native development creating challenges in securing these applications. Cloud-native applications are considered to be reasonably secure, but there are still opportunities for exploitation with new attack surfaces and increased access opportunities.
Securing cloud-native applications requires continuous pro- cesses that identify, assess, prioritize and adapt to risk in cloud-na- tive applications, infrastructures, and configurations. Traditional approaches to application security can’t keep up with changing environments and the fast-moving development processes. A new category of technology solutions is emerging to deliver on all of these needs.
Coined by Gartner, Cloud-Native Application Protection Plat- forms (CNAPPs) combine the functionality previously found in Cloud Security Posture Management (CSPM) and Cloud Work- load Protection Platform (CWPP) to scan workloads and con- figurations in development and protect them at runtime. Gartner introduced this term when it recognized how the dominance of multi-cloud deployments is forcing enterprises to combine intel- ligent automation, including CSPM and CWPPs, to protect their IaaS-deployed applications.
Broadly speaking, CNAPPs aim to address workload and configuration security by scanning them in development and pro- tecting them at runtime through an integrated, unified platform. CNAPP tools deliver unified visibility to SecOps and DevOps teams (DevSecOps) and enable them to respond to threats, secure cloud-native apps, and automate vulnerability and misconfigura- tion remediation. CNAPPs bring application and data context in the convergence of the CSPM and CWPP archetypes to protect hosts and workloads, including VMs, containers, and serverless functions.
For optimal security of cloud-native applications, security and risk professionals need to take an integrated approach starting with development and extending through run-time protection. In evalu- ating CNAPP offerings, the top five points for consideration include:
Securing workloads. Containers and microservices deliver in- credible speed and flexibility, with Continuous Integration and Continuous Delivery (CI/CD) becoming the standard for IT teams. The increased velocity of new code being rolled out re- quires better control over the attack surface and incorporating security earlier into the development phase to enable security is- sues to be detected early and fixed quickly, before applications are deployed.
“Cloud-native applications are considered to be reasonably secure, but there are still opportunities for exploitation with new attack surfaces and increased access opportunities.”
This includes instituting an integrated security approach that touches the entire life cycle of cloud native applications, starting in development and extending through production.
Require CWPP offerings to protect physical machines, VMs, containers and server-less workloads. Hybrid and multi-cloud architecture represents the future for most enterprises and is driving the transition to cloud-native application development. Legacy security solutions leverage installed host-based agents and network-based controls that lack the application context and appropriate control points within the new stack. Without these capabilities, it is impossible to adequately detect threats and re- spond to them.
Integrate and automate security testing. Older security solu- tions use installed host-based agents and network-based controls that lack the application context and appropriate control points within the new stack. Integrating security into the developer’s toolchain so that testing happens automatically as code is cre- ated and then moves through the development pipeline reduces the friction of adoption. Additionally, the great velocity of code changes pushed through CI/CD pipelines means that developer can impact security more than ever. Automation is key to em- bedded security controls into those pipelines without burdening developers with manual work. Without these capabilities, it is im- possible to adequately detect threats and respond to them.
Require CWPP vendors to provide CSPM/KSPM capabilities.
While CWPP secures the cloud native applications (workloads) an enterprise runs, CSPM helps secure the infrastructure on which it runs. This provides protection of your cloud infrastructure and veri- fies that your cloud services are configured securely. KSPM (Kuber- netes Security Posture Management) does a similar thing for Ku- bernetes, checking its numerous configurations against security best practices, and ensuring that workloads are securely deployed with the right privileges and constraints on resource use, networking, and other capabilities. More than just comple-
menting each other, these combined services are essential to provide security and visibility across as well as up and down your cloud stack.
Rani Osnat is the senior vice president of Strategy at Aqua.
54
JULY/AUGUST 2022 | SECURITY TODAY
SECURITY & RISK


































































































   52   53   54   55   56