SEARCH (ENTER TO SEE ALL RESULTS)

POPULAR TOPICS

Contributed
News
Analysis
The New Stack Makers
Tutorial
Podcast
Research
Feature
Science
Off-The-Shelf Hacker
Skip to content
  • Podcasts
    • TNS @Scale Series
    • TNS Analysts Round Table
    • TNS Context Weekly News
    • TNS Makers Interviews
    • All Podcasts
  • Events
  • Ebooks
    • DevOps
    • DevSecOps
    • Docker Ecosystem
    • Kubernetes Ecosystem
    • Microservices
    • Serverless
    • Storage
    • All Ebooks
  • Newsletter
  • Sponsorship
  • • • •
    • Podcasts
      • TNS @Scale Series
      • TNS Analysts Round Table
      • TNS Context Weekly News
      • TNS Makers Interviews
      • All Podcasts
    • Events
    • Ebooks
      • Machine Learning
      • DevOps
      • Serverless
      • Microservices
      • Kubernetes Ecosystem
      • Docker Ecosystem
      • All Ebooks
    • Newsletter
    • Sponsorship
Skip to content
  • Architecture
    • Cloud Native
    • Containers
    • Edge/IoT
    • Microservices
    • Networking
    • Serverless
    • Storage
  • Development
    • Development
    • Cloud Services
    • Data
    • Machine Learning
    • Security
  • Operations
    • CI/CD
    • Culture
    • DevOps
    • Kubernetes
    • Monitoring
    • Service Mesh
    • Tools
 

Security

▾ 1 MINUTE READ — CLOSE

When it comes to cloud computing and cloud native computing, application and network security take on a new dimension. Meeting this new set of requirements can be a challenge to companies and tool-makers currently focused on enterprise security. Witness the 2019 acquisition of cloud native security vendor Twistlock by traditional enterprise software vendor Palo Alto Networks.

Cloud native security has a new set of priorities that need to be addressed, which we will follow here closely as we track the development and adoption of cloud native security tools, as well as the evolution of traditional security tools into this marketplace.  Such tools should be API-first. They need to integrate easily within DevOps and CI/CD frameworks (“DevSecOps”). They need to offer real-time feedback and they need to be easily licensed for cloud computing environments. Present-day security vendors, except those devoted to the cloud native space, such as Aqua Security, have difficulty with all these requirements (Hence the acquisitions).

What these tool and service providers should be addressing, and what we also will follow, are the new requirements that come with introducing the container and the container orchestrator into a production environment. Container images must be scanned for buggy dependencies. Security policies for pods must be established.

Google itself has thrown itself into an entirely new security architecture for its own cloud, called the Zero-Trust model, which assumes a company firewall will be breached, so it is better to secure the application at the level of the user and device permissions.

The Internet-based collaborative model of application development needs to be better addressed as well. This is sometimes referred to as supply-chain security, where you need to not only worry about the security of your code, but the code you get from other sources, as well as the authentication measures used by these third parties. One break anywhere in the chain could lead to trouble in your operations This became evident with the Docker Hub intrusion in early 2019, which also affected GitHub, BitBucket and other public/private cloud-based repositories.


A newsletter digest of the week’s most important stories & analyses.

Do you also want to be notified of the following?
We don’t sell or share your email. By continuing, you agree to our Terms of Use and Privacy Policy.

Containers / Security / Sponsored / Contributed

A Security Comparison of Docker, CRI-O and Containerd

19 Mar 2021 7:43am, by Taylor Smith

API Management / Security / Contributed

Your Authorization System Is Broken. Here Are 5 Ways to Fix It

18 Mar 2021 5:00am, by Omri Gazitt

Culture / DevOps / Security / Sponsored

How a Security-Minded Culture Can Change Bad Habits

17 Mar 2021 1:53pm, by B. Cameron Gain

CI/CD / DevOps / Security

Sonatype Expands Focus to Code Analysis with MuseDev Addition

17 Mar 2021 8:50am, by Mike Melanson

API Management / DevOps / Security

With Auth0 purchase, Okta Will Boost Access APIs for Developers

16 Mar 2021 12:52pm, by B. Cameron Gain

Open Source / Security

Linux Foundation’s Sigstore Aims to Secure Software Supply Chains

15 Mar 2021 1:01pm, by Jack Wallen

DevOps / Security / Sponsored / Contributed

What Does ‘Shift Left’ Mean if Every Process Is a Circle?

11 Mar 2021 7:14am, by Arshad Rizvi

API Management / Data / Security / Sponsored

Mobile Development Gains in Databases and Authentication

10 Mar 2021 2:44pm, by Alex Williams and B. Cameron Gain

CI/CD / Kubernetes / Security / Contributed

4 Best Practice Steps for Kubernetes Policy Enforcement

8 Mar 2021 12:40pm, by Robert Brennan

Cloud Native / Security / Service Mesh

Curiefense, an Open Source, Envoy-Based Cloud Native Security Platform

8 Mar 2021 8:11am, by Steven J. Vaughan-Nichols

Cloud Native / Cloud Services / Security / Sponsored

HashiCorp Vault Gets Top Honors in Latest CNCF Tech Radar User Survey

4 Mar 2021 1:12pm, by Alex Williams and B. Cameron Gain

CI/CD / Security / Tools

Bridgecrew’s Checkov Extension: ‘Far-Left’ Automated Security

4 Mar 2021 10:29am, by B. Cameron Gain

DevOps / Security / Sponsored / Contributed

Addressing Security Throughout the Infrastructure DevOps Lifecycle

4 Mar 2021 9:17am, by Barak Schoster

API Management / Security / Serverless / Sponsored

How to Secure Web Applications in a Static and Dynamic World

3 Mar 2021 1:29pm, by Alex Williams and B. Cameron Gain

API Management / Security / Sponsored / Contributed

Why Marketing Should Care About Customer Identity and Access Management

2 Mar 2021 11:00am, by Darshana Gunawardana

API Management / Culture / Security / Contributed

To Support Business Continuity, Address Your API Security

1 Mar 2021 4:48pm, by Michelle McLean

CI/CD / Microservices / Security / Sponsored / Contributed

5 OPA Deployment Performance Models for Microservices

1 Mar 2021 12:59pm, by Anders Eknert

Cloud Services / Kubernetes / Security

Google’s New ‘Autopilot’ for Kubernetes

1 Mar 2021 11:20am, by Steven J. Vaughan-Nichols

CI/CD / Security / Sponsored / Contributed

SolarWinds Hack Reveals 3 Overlooked Steps to Securing a Software Supply Chain

26 Feb 2021 7:01am, by Tim Johnson

Linux / Monitoring / Security

Sysdig Hands off eBPF Falco Core to the Cloud Native Computing Foundation

25 Feb 2021 8:29am, by Mike Melanson

API Management / DevOps / Security / Sponsored

The Evolution of APIs: Current Vulnerabilities and Future Trends

24 Feb 2021 2:36pm, by Alex Williams and B. Cameron Gain

API Management / Security / Sponsored / Contributed

Leveraging Web Workers to Safely Store Access Tokens

24 Feb 2021 6:24am, by Theviyanthan Krishnamohan

Cloud Native / Cloud Services / Security / Sponsored

How to Tighten Security Across Complex and Cloud Native Environments

23 Feb 2021 2:16pm, by Alex Williams and B. Cameron Gain

CI/CD / Development / Security

CircleCI Offers a Private Option for ‘Orb’ Reusable Configuration Files

23 Feb 2021 10:04am, by B. Cameron Gain

The Best Of DevSecOps: Trends in Cloud Native Security Practices Ebook Cover

DevOps / Security / Sponsored

The Best of DevSecOps Ebook: Trends, Tools and Best Practices

23 Feb 2021 6:43am, by Alex Williams

CI/CD / Containers / Security

How to Install the SonarQube Security Analysis Platform

22 Feb 2021 2:29pm, by Jack Wallen

1 2 3 4 5 6 7 8 9 10
21 22 23 24 25 26 27 28 29 30

Architecture

  • Cloud Native
  • Containers
  • Edge/IoT
  • Microservices
  • Networking
  • Serverless
  • Storage

Development

  • Cloud Services
  • Data
  • Development
  • Machine Learning
  • Security

Operations

  • CI/CD
  • Culture
  • DevOps
  • Kubernetes
  • Monitoring
  • Service Mesh
  • Tools

The New Stack

  • Ebooks
  • Podcasts
  • Events
  • Newsletter
  • About / Contact
  • Sponsors
  • Sponsorship
  • Disclosures
  • Contributions
  • Twitter
  • Facebook
  • YouTube
  • Soundcloud
  • LinkedIn
  • Slideshare
  • RSS

© 2021 The New Stack. All rights reserved.

Privacy Policy. Terms of Use.