DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
The Latest "Software Integration: The Intersection of APIs, Microservices, and Cloud-Based Systems" Trend Report
Get the report
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. Cloud-Native Security Challenges and Opportunities

Cloud-Native Security Challenges and Opportunities

Apps born in the cloud present unique security challenges that many companies are not prepared to meet.

Brendon Macaraeg user avatar by
Brendon Macaraeg
·
Mar. 13, 19 · Presentation
Like (1)
Save
Tweet
Share
4.36K Views

Join the DZone community and get the full member experience.

Join For Free

Cloud computing is often the cornerstone of digital transformation efforts, and with the growth of cloud computing platforms like Amazon Web Services and Google Cloud Platform, cloud services are increasingly accessible. The move to cloud-native applications (also known as just cloud-native) is accelerating and already the default for over 60% of companies when they design, build and deploy their applications. However, the ability for companies to gain threat visibility and deploy effective security measures within production environments remains a visible gap.

Evidence of this gap surfaced in a recent survey co-sponsored by Signal Sciences, Duo and Capsule8, “The State of Cloud Native Security.” The report surveyed 486 IT leaders with a goal to better understand the security challenges and opportunities of the shift toward cloud-native applications in production environments.  

This post covers the high-level findings from the survey within the context of the security challenges facing organizations that want to build cloud-native applications to drive digital transformation within their organizations. 

Primary Drivers to the Cloud

Image title

Three primary drivers lead organizations down the path to cloud-native apps:

  1. Modernizing operations to sustain the business
  2. Enabling faster time to market 
  3. Increasing operational efficiencies

While the motivations varied across companies by size and industry, they all share similar end goals.

Security Risks of Cloud-Native

Regardless of business objectives, the results of the survey responses underscore that security risks pose significant challenges to organizations that want to deploy cloud-native applications.

  • Organizations struggle to balance security with the efficient deployment of production applications. 40 percent of respondents’ organizations do not currently have a DevOps function in place. The cause? Half said the lack of appropriate skills on their security teams was the primary obstacle to forming a DevOps practice.
  • False positives continue to plague IT and security organizations.  46 percent of those surveyed said that more than half of production environment security alerts were false positives.
  • Poor analytics is the number one cause of false positives. Nearly half of respondents reported this as a primary issue.
  • Organizations have limited real-time visibility into attacks. 73 percent say they lack actionable, fine-grain, real-time insight into threats and ongoing attacks.

Meeting Cloud-Native Security Challenges

Image title

The majority of enterprises today rely on web application firewalls (WAF) to secure their production environments. But the very largest enterprises studied – those with more than $20 billion in annual revenue – use RASP, or runtime application self-protection.

RASP, another web application security technology, attracted the attention of DevOps and security practitioners because it embeds directly within the application and collects telemetry at runtime. Signal Sciences next-gen WAF and RASP technology eliminates legacy WAF dependency on rules tuning while leveraging the code-layer instrumentation of RASP to gain detailed request and response data. For a more detailed explanation of the nuances of RASP approaches, check out our video: The Pros and Cons of RASP in 8 Minutes.

Worth mentioning is that both legacy WAFs and some RASP approaches are limited in their ability to protect against anything beyond core OWASP attacks. Yet the attack surface has grown, as have the techniques, making it important to gain visibility over unique application abuse and misuse cases like discount code abuse, fraudulent transactions, content scraping, and many other use cases. Signal Sciences can do so automatically with Power Rules — while maintaining performance at scale.

Budget Sources for a WAF Investment

Image title

Automated attack coverage sounds great, but organizations that recognize the need for adding a web application security technology to their security infrastructure must find the funds for the investment.

Budget sources to fund a WAF purchase differ by company, but the majority fund a purchase either from their network security or application security line items in their overall IT budget.  Regardless of the funding source, organizations are increasing their investments in strategic areas such as application and data security. By 2019, Gartner predicts that organizations will have increased their combined spend on application and data security tools by 61 percent.

The survey responses revealed that the larger the organization, the more likely its management team will leverage application security budget for WAF investments.

The Strategic Necessity of Application Security

In an era where both CISOs and security staff know their number one goal is to stop data breaches, application security is not only vital but a strategic necessity. But preventing a breach requires the ability to identify attacks in the first place. While 80 percent of respondents think that the rate of attacks on their production environments has increased by at least double over the last year, many are still not able to detect attacks effectively. More striking, when asked what percentage of attacks they can detect in their production systems, over a third said “less than 50 percent.” Clearly, these organizations need effective tools that will provide their not only attack visibility but the means to stop those attacks.

We invite you to learn more in-depth about how your peers are navigating the security challenges of the journey to cloud-native and how Signal Sciences can help you meet those challenges with our patented technology that automates web application security.

Application security Data security

Published at DZone with permission of Brendon Macaraeg. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Steel Threads Are a Technique That Will Make You a Better Engineer
  • Monolithic First
  • How To Choose the Right Streaming Database
  • DevOps for Developers: Continuous Integration, GitHub Actions, and Sonar Cloud

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: