SEARCH (ENTER TO SEE ALL RESULTS)

POPULAR TOPICS

Contributed
News
Analysis
The New Stack Makers
Tutorial
Research
Podcast
Science
Feature
Off-The-Shelf Hacker
Skip to content
  • Podcasts
    • TNS @Scale Series
    • TNS Analysts Round Table
    • TNS Context Weekly News
    • TNS Makers Interviews
    • All Podcasts
  • Events
  • Ebooks
    • Storage
    • DevOps
    • Serverless
    • Microservices
    • Kubernetes Ecosystem
    • Docker Ecosystem
    • All Ebooks
  • Newsletter
  • Sponsorship
  • • • •
    • Podcasts
      • TNS @Scale Series
      • TNS Analysts Round Table
      • TNS Context Weekly News
      • TNS Makers Interviews
      • All Podcasts
    • Events
    • Ebooks
      • Machine Learning
      • DevOps
      • Serverless
      • Microservices
      • Kubernetes Ecosystem
      • Docker Ecosystem
      • All Ebooks
    • Newsletter
    • Sponsorship
Skip to content
  • Architecture
    • Cloud Native
    • Containers
    • Edge/IoT
    • Microservices
    • Networking
    • Serverless
    • Storage
  • Development
    • Development
    • Cloud Services
    • Data
    • Machine Learning
    • Security
  • Operations
    • CI/CD
    • Culture
    • DevOps
    • Kubernetes
    • Monitoring
    • Service Mesh
    • Tools
 

Security

▾ 1 MINUTE READ — CLOSE

When it comes to cloud computing and cloud native computing, application and network security take on a new dimension. Meeting this new set of requirements can be a challenge to companies and tool-makers currently focused on enterprise security. Witness the 2019 acquisition of cloud native security vendor Twistlock by traditional enterprise software vendor Palo Alto Networks.

Cloud native security has a new set of priorities that need to be addressed, which we will follow here closely as we track the development and adoption of cloud native security tools, as well as the evolution of traditional security tools into this marketplace.  Such tools should be API-first. They need to integrate easily within DevOps and CI/CD frameworks (“DevSecOps”). They need to offer real-time feedback and they need to be easily licensed for cloud computing environments. Present-day security vendors, except those devoted to the cloud native space, such as Aqua Security, have difficulty with all these requirements (Hence the acquisitions).

What these tool and service providers should be addressing, and what we also will follow, are the new requirements that come with introducing the container and the container orchestrator into a production environment. Container images must be scanned for buggy dependencies. Security policies for pods must be established.

Google itself has thrown itself into an entirely new security architecture for its own cloud, called the Zero-Trust model, which assumes a company firewall will be breached, so it is better to secure the application at the level of the user and device permissions.

The Internet-based collaborative model of application development needs to be better addressed as well. This is sometimes referred to as supply-chain security, where you need to not only worry about the security of your code, but the code you get from other sources, as well as the authentication measures used by these third parties. One break anywhere in the chain could lead to trouble in your operations This became evident with the Docker Hub intrusion in early 2019, which also affected GitHub, BitBucket and other public/private cloud-based repositories.


A newsletter digest of the week’s most important stories & analyses.

Do you also want to be notified of the following?
We don’t sell or share your email. By continuing, you agree to our Terms of Use and Privacy Policy.

Linux / Open Source / Security

Linux Kernel Security in the Age of Spectre, Meltdown

22 Oct 2019 12:44pm, by Joab Jackson

Cloud Native / Containers / Security

How Zero Trust, Service Meshes and Role-Based Access Control Can Prevent a Cloud-Based Security Mess

16 Oct 2019 3:00am, by Jennifer Riggins

DevOps / Security / Contributed

DevSecOps: Embrace DevOps While Protecting Credentials

15 Oct 2019 4:00pm, by James Legg

Development / Security / Tools

Survey Says: GitLab Widely Used for Software Scanning, GitHub Looms Large

10 Oct 2019 3:00pm, by Lawrence E Hecht

API Management / Development / Security / Contributed

The APIs Malicious Hackers Love to Exploit

10 Oct 2019 10:08am, by Jon Wallace

Containers / Monitoring / Security / Contributed

Real-Time Visibility and Alerting for Containerized Infrastructure

10 Oct 2019 3:00am, by Sean Porter

Kubernetes / Security

Kubernetes ‘Billion Laughs’ Vulnerability Is No Laughing Matter

9 Oct 2019 8:11am, by Jack Wallen

Development / Security / Contributed

Developers: Fuzzing, Symbolic Execution with Regression Testing Offers App Resilience

8 Oct 2019 10:55am, by Mel Llaguno

Security / Service Mesh / Sponsored / Contributed

How a ‘Zero Trust’ Platform Can Help Solve Service Mesh Challenges

8 Oct 2019 9:20am, by Jonathan Holmes

Microservices / Security / Service Mesh / Sponsored

Don’t Let SREs Leave Cybersecurity Behind

7 Oct 2019 5:00pm, by Jennifer Riggins

Security / Technology

Linux Kernel Finally Gets Its Lockdown

4 Oct 2019 10:49am, by Jack Wallen

CI/CD / DevOps / Security / Sponsored

How Automation Can Help to Close the Security Loop

3 Oct 2019 5:00pm, by B. Cameron Gain

Networking / Security

Gremlin’s Scenarios Simulate Common Outages for Chaos Engineering

26 Sep 2019 10:00am, by Jennifer Riggins

CI/CD / DevOps / Security

Integrating Security into Build Processes Signals DevSecOps Tipping Point

26 Sep 2019 9:41am, by Lawrence E Hecht

CI/CD / Data / Security

GitLab Commit Brooklyn: DevOps as a Single Application

17 Sep 2019 3:00pm, by Joab Jackson

Kubernetes / Security / Contributed

3 Realistic Approaches to Kubernetes RBAC

5 Sep 2019 3:00am, by Catherine Cai

Kubernetes / Security / Service Mesh

Aporeto’s Kubernetes Security Platform Offers Multiregion Cluster Support, Service Mesh Integration

29 Aug 2019 9:07am, by Mike Melanson

Kubernetes / Networking / Security

Netflix Discovers Severe Kubernetes HTTP/2 Vulnerabilities

23 Aug 2019 2:10pm, by Jack Wallen

Security

Puppet Turns Its Automation Focus to Security with Puppet Remediate

22 Aug 2019 3:00am, by Mike Melanson

Security

Linux Foundation Forms the Confidential Computing Consortium to Protect Data In Use

21 Aug 2019 9:00am, by Mike Melanson

Kubernetes / Security / Technology

Kubernetes Access Control: Exploring Service Accounts

16 Aug 2019 3:00am, by Janakiram MSV

Kubernetes / Security

A Practical Approach to Understanding Kubernetes Authorization

14 Aug 2019 3:00am, by Janakiram MSV

DevOps / Security / Contributed

Shifting Zero Trust Left with Cloud Native Software

12 Aug 2019 3:00am, by Gadi Naor

Monitoring / Security / Technology

Sysdig Adds Anomaly Detection and Runtime Profiling to Its Cloud Native Security Platform

7 Aug 2019 3:00am, by Mike Melanson

Cloud Native / Kubernetes / Security

CNCF Open Sources Security Audit of Core Kubernetes Components

6 Aug 2019 8:00am, by Mike Melanson

Containers / Security / Contributed

Security Concerns Around Rapid Container Growth

5 Aug 2019 6:00am, by Asif Awan

11 12 13 14 15 16 17 18 19 20

Architecture

  • Cloud Native
  • Containers
  • Edge/IoT
  • Microservices
  • Networking
  • Serverless
  • Storage

Development

  • Cloud Services
  • Data
  • Development
  • Machine Learning
  • Security

Operations

  • CI/CD
  • Culture
  • DevOps
  • Kubernetes
  • Monitoring
  • Service Mesh
  • Tools

The New Stack

  • Ebooks
  • Podcasts
  • Events
  • Newsletter
  • About / Contact
  • Sponsors
  • Sponsorship
  • Disclosures
  • Contributions
  • Twitter
  • Facebook
  • YouTube
  • Soundcloud
  • LinkedIn
  • Slideshare
  • RSS

© 2021 The New Stack. All rights reserved.

Privacy Policy. Terms of Use.