SEARCH (ENTER TO SEE ALL RESULTS)

POPULAR TOPICS

Contributed
News
Analysis
The New Stack Makers
Tutorial
Podcast
Research
Feature
Science
Profile
Skip to content
  • Podcasts
  • Events
  • Ebooks
    • DevOps
    • DevSecOps
    • Docker Ecosystem
    • Kubernetes Ecosystem
    • Microservices
    • Serverless
    • Storage
    • All Ebooks
  • Newsletter
  • Sponsorship
  • • • •
    • Podcasts
      • TNS @Scale Series
      • TNS Analysts Round Table
      • TNS Context Weekly News
      • TNS Makers Interviews
      • All Podcasts
    • Events
    • Ebooks
      • Machine Learning
      • DevOps
      • Serverless
      • Microservices
      • Kubernetes Ecosystem
      • Docker Ecosystem
      • All Ebooks
    • Newsletter
    • Sponsorship
Skip to content
  • Architecture
    • Cloud Native
    • Containers
    • Edge/IoT
    • Microservices
    • Networking
    • Serverless
    • Storage
  • Development
    • Development
    • Cloud Services
    • Data
    • Machine Learning
    • Security
  • Operations
    • CI/CD
    • Culture
    • DevOps
    • Kubernetes
    • Monitoring
    • Service Mesh
    • Tools
 

Security

▾ 1 MINUTE READ — CLOSE

When it comes to cloud computing and cloud native computing, application and network security take on a new dimension. Meeting this new set of requirements can be a challenge to companies and tool-makers currently focused on enterprise security. Witness the 2019 acquisition of cloud native security vendor Twistlock by traditional enterprise software vendor Palo Alto Networks.

Cloud native security has a new set of priorities that need to be addressed, which we will follow here closely as we track the development and adoption of cloud native security tools, as well as the evolution of traditional security tools into this marketplace.  Such tools should be API-first. They need to integrate easily within DevOps and CI/CD frameworks (“DevSecOps”). They need to offer real-time feedback and they need to be easily licensed for cloud computing environments. Present-day security vendors, except those devoted to the cloud native space, such as Aqua Security, have difficulty with all these requirements (Hence the acquisitions).

What these tool and service providers should be addressing, and what we also will follow, are the new requirements that come with introducing the container and the container orchestrator into a production environment. Container images must be scanned for buggy dependencies. Security policies for pods must be established.

Google itself has thrown itself into an entirely new security architecture for its own cloud, called the Zero-Trust model, which assumes a company firewall will be breached, so it is better to secure the application at the level of the user and device permissions.

The Internet-based collaborative model of application development needs to be better addressed as well. This is sometimes referred to as supply-chain security, where you need to not only worry about the security of your code, but the code you get from other sources, as well as the authentication measures used by these third parties. One break anywhere in the chain could lead to trouble in your operations This became evident with the Docker Hub intrusion in early 2019, which also affected GitHub, BitBucket and other public/private cloud-based repositories.


A newsletter digest of the week’s most important stories & analyses.

Do you also want to be notified of the following?
We don’t sell or share your email. By continuing, you agree to our Terms of Use and Privacy Policy.

Security

This Week on The New Stack: Kubernetes and the Single Sign-on

23 Mar 2018 1:57pm, by Libby Clark

Kubernetes / Security

The Top Challenges Kubernetes Users Face with Deployment

22 Mar 2018 9:00am, by Lawrence E Hecht

Containers / Security / Sponsored / Contributed

Five Docker Security Best Practices

22 Mar 2018 6:00am, by Amit Sharma

Machine Learning / Security / Sponsored / Contributed

Machine Learning and Beyond: Algorithmic Detection in Security

19 Mar 2018 8:37am, by Vishwanath Raman

Security / Sponsored / Contributed

Why a Firewall Can’t Protect Against a Memcache DDoS Attack

19 Mar 2018 3:00am, by Nitzan Niv

Containers / Kubernetes / Security

Aqua Extends Container Security Platform to Kubernetes, Cloud Services

12 Mar 2018 12:15pm, by Joab Jackson

Culture / Edge / IoT / Open Source / Security

Mender: An Open Source Software Updater for the Internet of Things

12 Mar 2018 6:00am, by Susan Hall

Kubernetes / Security / Storage / Contributed

Single Sign-On for Kubernetes: An Introduction

9 Mar 2018 9:06am, by Joel Speed

Cloud Services / Security

Mesosphere 1.11 Focuses on Edge Computing, Multicloud and Disaster Recovery

8 Mar 2018 11:40am, by Joab Jackson

Containers / Kubernetes / Security

What the Data Says about Kubernetes Deployment Patterns

6 Mar 2018 9:14am, by Lawrence E Hecht

Cloud Native / Microservices / Security

This Week in News: Vulnerability Disclosure, Microservices Architecture

2 Mar 2018 3:00pm, by TNS Staff

Security

How a Vulnerability Disclosure Policy Keeps Your Security Flaws off the Dark Web

27 Feb 2018 10:00am, by Lucian Constantin

Security / Sponsored / Contributed

Security in the Modern Data Center

27 Feb 2018 8:55am, by Nitzan Niv

Data / Machine Learning / Security

Intezer Provides Code ‘DNA Mapping’ to Root out Malware

26 Feb 2018 10:21am, by Susan Hall

Kubernetes / Open Source / Security

Container Security Considerations in a Kubernetes Deployment

22 Feb 2018 9:48am, by Chenxi Wang, Ph.D.

Cloud Native / Security / Sponsored / Contributed

Security: What Enterprise Architects Need to Know Today

21 Feb 2018 8:43am, by Twain Taylor

CI/CD / Development / Security

Chef InSpec 2.0 Puts the Security into DevSecOps

20 Feb 2018 9:18am, by Susan Hall

DevOps / Security

SecOps Spends Its Days Monitoring

16 Feb 2018 2:00pm, by Lawrence E Hecht

Kubernetes / Monitoring / Security

The 4 Major Tenets of Kubernetes Security

15 Feb 2018 11:36am, by Chenxi Wang, Ph.D.

Cloud Native / Security / Sponsored / Contributed

The Continuum of Cloud-Native Topologies

14 Feb 2018 1:00pm, by John Morello

Security / Sponsored / Contributed

How to Test Your Container Security with Real World Exploits

12 Feb 2018 1:32pm, by Yathi Naik

Microservices / Security / Sponsored / Contributed

Defining the Perimeter in a Microservices World

12 Feb 2018 1:04pm, by Twain Taylor

Security / Contributed

The Impact of Spectre and Meltdown on the Cloud

8 Feb 2018 10:18am, by Craig McLuckie

CI/CD / DevOps / Security / Contributed

DevOps, Security and Development Equals a Recipe for Success in 2018

8 Feb 2018 6:00am, by Manish Gupta

Containers / Kubernetes / Security

Kubernetes Deployment and Security Patterns Ebook Now Available

6 Feb 2018 1:34pm, by Alex Williams

Data / Security / Contributed

How to Minimize the Meltdown Patch Performance Penalty

2 Feb 2018 3:01am, by Dor Laor

21 22 23 24 25 26 27 28 29 30

Architecture

  • Cloud Native
  • Containers
  • Edge/IoT
  • Microservices
  • Networking
  • Serverless
  • Storage

Development

  • Cloud Services
  • Data
  • Development
  • Machine Learning
  • Security

Operations

  • CI/CD
  • Culture
  • DevOps
  • Kubernetes
  • Monitoring
  • Service Mesh
  • Tools

The New Stack

  • Ebooks
  • Podcasts
  • Events
  • Newsletter
  • About / Contact
  • Sponsors
  • Sponsorship
  • Disclosures
  • Contributions
  • Twitter
  • Facebook
  • YouTube
  • Soundcloud
  • LinkedIn
  • Slideshare
  • RSS

© 2021 The New Stack. All rights reserved.

Privacy Policy. Terms of Use.