SEARCH (ENTER TO SEE ALL RESULTS)

POPULAR TOPICS

Contributed
News
Analysis
The New Stack Makers
Tutorial
Research
Podcast
Science
Feature
Off-The-Shelf Hacker
Skip to content
  • Podcasts
    • TNS @Scale Series
    • TNS Analysts Round Table
    • TNS Context Weekly News
    • TNS Makers Interviews
    • All Podcasts
  • Events
  • Ebooks
    • Storage
    • DevOps
    • Serverless
    • Microservices
    • Kubernetes Ecosystem
    • Docker Ecosystem
    • All Ebooks
  • Newsletter
  • Sponsorship
  • • • •
    • Podcasts
      • TNS @Scale Series
      • TNS Analysts Round Table
      • TNS Context Weekly News
      • TNS Makers Interviews
      • All Podcasts
    • Events
    • Ebooks
      • Machine Learning
      • DevOps
      • Serverless
      • Microservices
      • Kubernetes Ecosystem
      • Docker Ecosystem
      • All Ebooks
    • Newsletter
    • Sponsorship
Skip to content
  • Architecture
    • Cloud Native
    • Containers
    • Edge/IoT
    • Microservices
    • Networking
    • Serverless
    • Storage
  • Development
    • Development
    • Cloud Services
    • Data
    • Machine Learning
    • Security
  • Operations
    • CI/CD
    • Culture
    • DevOps
    • Kubernetes
    • Monitoring
    • Service Mesh
    • Tools
 

Security

▾ 1 MINUTE READ — CLOSE

When it comes to cloud computing and cloud native computing, application and network security take on a new dimension. Meeting this new set of requirements can be a challenge to companies and tool-makers currently focused on enterprise security. Witness the 2019 acquisition of cloud native security vendor Twistlock by traditional enterprise software vendor Palo Alto Networks.

Cloud native security has a new set of priorities that need to be addressed, which we will follow here closely as we track the development and adoption of cloud native security tools, as well as the evolution of traditional security tools into this marketplace.  Such tools should be API-first. They need to integrate easily within DevOps and CI/CD frameworks (“DevSecOps”). They need to offer real-time feedback and they need to be easily licensed for cloud computing environments. Present-day security vendors, except those devoted to the cloud native space, such as Aqua Security, have difficulty with all these requirements (Hence the acquisitions).

What these tool and service providers should be addressing, and what we also will follow, are the new requirements that come with introducing the container and the container orchestrator into a production environment. Container images must be scanned for buggy dependencies. Security policies for pods must be established.

Google itself has thrown itself into an entirely new security architecture for its own cloud, called the Zero-Trust model, which assumes a company firewall will be breached, so it is better to secure the application at the level of the user and device permissions.

The Internet-based collaborative model of application development needs to be better addressed as well. This is sometimes referred to as supply-chain security, where you need to not only worry about the security of your code, but the code you get from other sources, as well as the authentication measures used by these third parties. One break anywhere in the chain could lead to trouble in your operations This became evident with the Docker Hub intrusion in early 2019, which also affected GitHub, BitBucket and other public/private cloud-based repositories.


A newsletter digest of the week’s most important stories & analyses.

Do you also want to be notified of the following?
We don’t sell or share your email. By continuing, you agree to our Terms of Use and Privacy Policy.

Containers / Kubernetes / Security

Kubernetes Deployment and Security Patterns Ebook Now Available

6 Feb 2018 1:34pm, by Alex Williams

Data / Security / Contributed

How to Minimize the Meltdown Patch Performance Penalty

2 Feb 2018 3:01am, by Dor Laor

Security / Contributed

CPX 2018: Sizing Up Cloud Security Fallout from Spectre and Meltdown

2 Feb 2018 3:00am, by Gadi Naor

Cloud Native / Containers / Data / Kubernetes / Security

4 Threat Models for Kubernetes Deployment Security

1 Feb 2018 9:40am, by Chenxi Wang, Ph.D.

Containers / Security

Containers Offer Good Protection Against Spectre and Meltdown Attacks if You Know What to Do

1 Feb 2018 3:00am, by B. Cameron Gain

Kubernetes / Microservices / Security

The Data Center Is Olympus: Operational Approaches to Securing Kubernetes

31 Jan 2018 1:00pm, by Alex Williams

Cloud Native / Security

Twistlock CTO John Morello on What Makes Distributed Security ‘Cloud-Native’

30 Jan 2018 2:00pm, by Scott M. Fulton III

Monitoring / Open Source / Security

With Unstable Meltdown Patches You Might Want to Consider Detection Instead

30 Jan 2018 3:00am, by Lucian Constantin

Cloud Native / Kubernetes / Security / Sponsored

Strengthening the Kubernetes Core for Improved Operations

29 Jan 2018 11:16am, by Libby Clark

Machine Learning / Security

This Week in News: Meet Your New Pair-Programming Partner

26 Jan 2018 2:00pm, by TNS Staff

DevOps / Security / Contributed

DevOps and Security: How to Overcome Cultural Challenges and Transform to True DevSecOps

22 Jan 2018 10:00am, by Mike Kail

Intel CEO Brian Krzanich at CES 2018 (via Intel YouTube channel).png

Culture / Security

Why the Raspberry Pi is Safe from the Meltdown and Spectre Exploits

14 Jan 2018 6:00am, by David Cassel

Cloud Native / Development / Security

This Week in News: Meltdown/Spectre Woes, and the Future of JavaScript

12 Jan 2018 3:00pm, by TNS Staff

CI/CD / Culture / DevOps / Security / Sponsored / Contributed

5 DevOps Myths that Block Collaboration with SecOps

11 Jan 2018 6:00am, by Gadi Naor

Development / Security

npm Spam Cleanup Briefly Zaps a Few Legit Software Packages

10 Jan 2018 12:11pm, by Alex Handy

Containers / Kubernetes / Security / Storage / Contributed

All the Fun in Kubernetes 1.9

9 Jan 2018 9:00am, by Dan Garfield

Cloud Native / Containers / Open Source / Security

What You Need to Know About the Meltdown and Spectre CPU Flaws

8 Jan 2018 3:00am, by Lucian Constantin

Security

Linus Torvalds on Meltdown: Perhaps We Should Move to ARM

4 Jan 2018 4:08pm, by Agam Shah

Security / Storage

BeyondCorp: How Google Ditched VPNs for Remote Employee Access

3 Jan 2018 9:34am, by Joab Jackson

Development / Open Source / Security

Fuzzing: An Old Testing Technique Comes of Age

22 Dec 2017 3:00am, by Bruce Byfield

DevOps / Security / Sponsored / Contributed

5 SecOps Myths that Block Collaboration with DevOps

19 Dec 2017 5:00am, by Gadi Naor

Containers / Kubernetes / Security

Capsule8 Is All About Stopping Attacks in Real-Time

19 Dec 2017 3:00am, by Susan Hall

Cloud Native / Containers / Kubernetes / Security

Kata Containers: Secure, Lightweight Virtual Machines for Container Environments

18 Dec 2017 10:16am, by Scott M. Fulton III

CI/CD / Development / Microservices / Security

ShiftLeft Shifts Security Focus to Analyzing Applications, Not Reacting to Threats

15 Dec 2017 12:00pm, by Susan Hall

CI/CD / Cloud Services / Containers / Data / Development / DevOps / Kubernetes / Monitoring / Security

CloudPassage’s Security-as-a-Service Addresses Needs in Speed, Compliance

13 Dec 2017 10:04am, by Susan Hall

Development / Security

Node.js Fixes High-Risk Data Confidentiality Flaw

12 Dec 2017 9:48am, by Lucian Constantin

11 12 13 14 15 16 17 18 19 20

Architecture

  • Cloud Native
  • Containers
  • Edge/IoT
  • Microservices
  • Networking
  • Serverless
  • Storage

Development

  • Cloud Services
  • Data
  • Development
  • Machine Learning
  • Security

Operations

  • CI/CD
  • Culture
  • DevOps
  • Kubernetes
  • Monitoring
  • Service Mesh
  • Tools

The New Stack

  • Ebooks
  • Podcasts
  • Events
  • Newsletter
  • About / Contact
  • Sponsors
  • Sponsorship
  • Disclosures
  • Contributions
  • Twitter
  • Facebook
  • YouTube
  • Soundcloud
  • LinkedIn
  • Slideshare
  • RSS

© 2021 The New Stack. All rights reserved.

Privacy Policy. Terms of Use.