SlideShare a Scribd company logo
SECURITY THAT SCALES
WITH CLOUD-NATIVE
DEVELOPMENT
THE NEED FOR A PLATFORM APPROACH
As organizations increasingly leverage cloud platforms
and cloud-native development, security teams need an effective
way to manage security risk while keeping up with faster
development cycles.
Cloud-native application development allows developers to quickly assemble applications from third-party code and templates.
While this saves them time, it increases the chances of introducing mistakes and vulnerabilities that may be exploited.
Adapting Security to Cloud-native Development
Conclusion
As organizations increasingly adopt cloud-native development for faster release cycles, security teams need an advanced security
platform that will enable them to scale to support the rapid growth enabled by cloud-native development. The right solution must
drive efficiency by incorporating security into development processes while enabling security teams to effectively manage risk.
Source: Enterprise Strategy Group Research Report, Walking the Line: GitOps and Shift Left Security, November 2022.
Source: Enterprise Strategy Group Research, Cloud Entitlements and Posture Management Trends.
© 2023 TechTarget, Inc. All Rights Reserved.
Organizations are concerned about hackers increasingly targeting OSS due to its wide usage. They need effective tools
to better understand OSS usage risks so they can quickly respond when vulnerabilities are found.
» Open source software challenges and concerns
» Organizations have also faced a variety of security incidents and related consequences with their internally
developed cloud-native applications in the last year, with only 3% not experiencing incidents.
» Top three impacts of misconfigured IaC
27+
23
+
50
+
Q
20+
30
+
50
+
Q
20+
30
+
50
+
Q
20+
30
+
50
+
Q
21+
29
+
50
+
Q
20+
30
+
50
+
Q
19+
31
+
50
+
Q
Organizations are prioritizing developer-focused security strategies, including shifting some security responsibilities
to developers because it’s the only way for security teams to scale to support the increased speed and volume of releases.
Organizations are increasingly looking for consolidated approaches, or cloud-native application protection platforms (CNAPPs),
to efficiently mitigate security risk as development scales. These platforms tie security in development processes to improving
security posture, helping security teams effectively manage risk for cloud-native applications.
» Priority level for adopting a developer-focused security strategy
Incorporating Security into Development
Scaling with a Platform Approach
» Usage of open source software (OSS)
organizations use open source software in
programming cloud-native applications.
8in10
46%
Unauthorized access to
applications and data
43%
Introduction of crypto-jacking
malware to mine cryptocurrency
41%
Remediation steps impacted
service level agreements (SLAs)
3% 42% 49% 6%
< 25% 25% to 50% 51% to 75% > 75%
» Percentage of code composition that is OSS
96%
83%
of organizations are using or plan to use IaC.
of respondents say they are experiencing an increase in IaC template misconfigurations.
960+40=
830+170=
» Infrastructure-as-code (IaC) Adoption
While utilizing IaC templates empowers
developers to provision their own
infrastructure instead of waiting for
IT or operations teams to set it up for
them, it also increases security risk.
46+54+S 41+59+S
43+57+S
15%
Slightly comfortable
49%
Mostly comfortable
36%
Completely comfortable
15+49+36+S
» Security teams’ comfort level adopting
a developer-focused security strategy
» Organizations are also investing in solutions that integrate security processes into developer workflows
to more efficiently mitigate risk and reduce security incidents.
69%
We expect to make significant investments
31%
We expect to make
moderate investments
100%
0%
68%
31%
It’s a high priority (i.e., it will have a significant
impact on our security program)
It’s important, but not a high priority (i.e., we have
higher security and/or AppDev priorities)
680+320=
310+690=
» Top 10 priorities for securing cloud-native software development process
1. Improving application
security testing
5. Discovering and inspecting
APIs in source code
3. Applying runtime API
security controls
7. Scanning open source code
components and third-party libraries
9. Scanning production environments
for misconfigurations
2. Detecting secrets that have
been committed and stored in source
code repositories
6. Remediating malware before
deployment to production
4. Identifying software vulnerabilities
before deployment to production
8. Remediating software vulnerabilities
before deployment to production
10. Identifying malware
before deployment to production
1. Addressing the sheer number of
assets that are cloud-resident
3. Meeting prescribed best practices
for the configuration of cloud-resident
workloads and the use of cloud APIs
4. Meeting demands from the organization's
customers/partners/supply chain
5. Automating security controls via integration
with existing DevOps tools
2. Preparing for security incidents
our organization may experience
in the future
» Top 5 business drivers for cloud security posture management
» Most organizations believe that a platform approach will drive efficiency to enable security to scale with cloud-native development.
85%
of organizations said a
CNAPP will give them a
consolidated approach
for more efficient cloud
security risk mitigation.
87%
of organizations said
a CNAPP helps drive
efficiency in connecting
application security
processes to security
posture management.
85+15+S 87+13+S
About Cisco
As a global industry leader in enterprise security solutions, Cisco Systems provides leading edge security solutions that protect
corporate data from hackers. Modern solutions to managing mixed private and public cloud environments require management
of the entire stack of technologies. Cisco Full Stack Observability solution innovatively dovetails with other Cisco stack
solutions including Cisco’s CNAPP Cloud-Native Application Security solutions. Collectively, this solution provides an intelligent,
comprehensive view of the total IT technology stack, providing high-resolution insights and metrics that allow businesses to run at
their full potential.
To see how Cisco can address your cloud-native application security needs from code to cloud, please see link below.
learn more
Having a high percentage
of application code
that is open source
Identifying vulnerabilities
in the code
Applying an issued patch
quickly once released
Quickly remediating
a vulnerability
Understanding code
composition and producing
a software bill of materials
Being victims of hackers
targeting popular/commonly
used open source software
Trusting the source
of the code
54%
39% 39% 38%
39%
41% 40%
3%
26%
27%
28%
31%
33%
34%
35%
37%
38%
We haven’t experienced one of these incidents in the last 12 months
Compromised privileged user credentials
“Zero day” exploit(s) that took advantage of new and previously unknown
vulnerabilities in internally developed code
“Zero day” exploit(s) that took advantage of new and previously unknown
vulnerabilities in open source software
Secrets stolen from a source code repository
Exploit of a misconfigured cloud service
Exploit(s) that took advantage of known vulnerabilities in open source software
Compromised services account credentials
Exploit(s) that took advantage of known vulnerabilities in internally developed code
Attacks that resulted in the loss of data due to the insecure use of APIs

More Related Content

Similar to Security that Scales with Cloud Native Development

The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
Alert Logic
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
lior mazor
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
HCLSoftware
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
HCLSoftware
 
Fortify Continuous Delivery
Fortify Continuous DeliveryFortify Continuous Delivery
Fortify Continuous Delivery
Mainstay
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
Alert Logic
 
The Intersection of Security and DevOps
The Intersection of Security and DevOpsThe Intersection of Security and DevOps
The Intersection of Security and DevOps
Alert Logic
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
Alert Logic
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
DevOps.com
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
Stefan Streichsbier
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secops
Mohammed Ahmed
 
Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset  Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset
Denim Group
 
DevSecOps Trends in 2022 How to Stay Secured, Innovative, and Productive in D...
DevSecOps Trends in 2022 How to Stay Secured, Innovative, and Productive in D...DevSecOps Trends in 2022 How to Stay Secured, Innovative, and Productive in D...
DevSecOps Trends in 2022 How to Stay Secured, Innovative, and Productive in D...
Urolime Technologies
 
Twistlock: 7 Experts on Cloud-Native Security
Twistlock: 7 Experts on Cloud-Native SecurityTwistlock: 7 Experts on Cloud-Native Security
Twistlock: 7 Experts on Cloud-Native Security
Mighty Guides, Inc.
 
Testing infrastructure as code
Testing infrastructure as codeTesting infrastructure as code
Testing infrastructure as code
Prancer Io
 
Emerging Trends in Software Development-Aug-2019
Emerging Trends in Software Development-Aug-2019Emerging Trends in Software Development-Aug-2019
Emerging Trends in Software Development-Aug-2019
Nevill Nguyen
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
Synopsys Software Integrity Group
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
Tej Luthra
 

Similar to Security that Scales with Cloud Native Development (20)

The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
 
Veracode - Overview
Veracode - OverviewVeracode - Overview
Veracode - Overview
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 
Fortify Continuous Delivery
Fortify Continuous DeliveryFortify Continuous Delivery
Fortify Continuous Delivery
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
 
The Intersection of Security and DevOps
The Intersection of Security and DevOpsThe Intersection of Security and DevOps
The Intersection of Security and DevOps
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secops
 
Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset  Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset
 
DevSecOps Trends in 2022 How to Stay Secured, Innovative, and Productive in D...
DevSecOps Trends in 2022 How to Stay Secured, Innovative, and Productive in D...DevSecOps Trends in 2022 How to Stay Secured, Innovative, and Productive in D...
DevSecOps Trends in 2022 How to Stay Secured, Innovative, and Productive in D...
 
Twistlock: 7 Experts on Cloud-Native Security
Twistlock: 7 Experts on Cloud-Native SecurityTwistlock: 7 Experts on Cloud-Native Security
Twistlock: 7 Experts on Cloud-Native Security
 
Testing infrastructure as code
Testing infrastructure as codeTesting infrastructure as code
Testing infrastructure as code
 
Emerging Trends in Software Development-Aug-2019
Emerging Trends in Software Development-Aug-2019Emerging Trends in Software Development-Aug-2019
Emerging Trends in Software Development-Aug-2019
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Security that Scales with Cloud Native Development

  • 1. SECURITY THAT SCALES WITH CLOUD-NATIVE DEVELOPMENT THE NEED FOR A PLATFORM APPROACH As organizations increasingly leverage cloud platforms and cloud-native development, security teams need an effective way to manage security risk while keeping up with faster development cycles. Cloud-native application development allows developers to quickly assemble applications from third-party code and templates. While this saves them time, it increases the chances of introducing mistakes and vulnerabilities that may be exploited. Adapting Security to Cloud-native Development Conclusion As organizations increasingly adopt cloud-native development for faster release cycles, security teams need an advanced security platform that will enable them to scale to support the rapid growth enabled by cloud-native development. The right solution must drive efficiency by incorporating security into development processes while enabling security teams to effectively manage risk. Source: Enterprise Strategy Group Research Report, Walking the Line: GitOps and Shift Left Security, November 2022. Source: Enterprise Strategy Group Research, Cloud Entitlements and Posture Management Trends. © 2023 TechTarget, Inc. All Rights Reserved. Organizations are concerned about hackers increasingly targeting OSS due to its wide usage. They need effective tools to better understand OSS usage risks so they can quickly respond when vulnerabilities are found. » Open source software challenges and concerns » Organizations have also faced a variety of security incidents and related consequences with their internally developed cloud-native applications in the last year, with only 3% not experiencing incidents. » Top three impacts of misconfigured IaC 27+ 23 + 50 + Q 20+ 30 + 50 + Q 20+ 30 + 50 + Q 20+ 30 + 50 + Q 21+ 29 + 50 + Q 20+ 30 + 50 + Q 19+ 31 + 50 + Q Organizations are prioritizing developer-focused security strategies, including shifting some security responsibilities to developers because it’s the only way for security teams to scale to support the increased speed and volume of releases. Organizations are increasingly looking for consolidated approaches, or cloud-native application protection platforms (CNAPPs), to efficiently mitigate security risk as development scales. These platforms tie security in development processes to improving security posture, helping security teams effectively manage risk for cloud-native applications. » Priority level for adopting a developer-focused security strategy Incorporating Security into Development Scaling with a Platform Approach » Usage of open source software (OSS) organizations use open source software in programming cloud-native applications. 8in10 46% Unauthorized access to applications and data 43% Introduction of crypto-jacking malware to mine cryptocurrency 41% Remediation steps impacted service level agreements (SLAs) 3% 42% 49% 6% < 25% 25% to 50% 51% to 75% > 75% » Percentage of code composition that is OSS 96% 83% of organizations are using or plan to use IaC. of respondents say they are experiencing an increase in IaC template misconfigurations. 960+40= 830+170= » Infrastructure-as-code (IaC) Adoption While utilizing IaC templates empowers developers to provision their own infrastructure instead of waiting for IT or operations teams to set it up for them, it also increases security risk. 46+54+S 41+59+S 43+57+S 15% Slightly comfortable 49% Mostly comfortable 36% Completely comfortable 15+49+36+S » Security teams’ comfort level adopting a developer-focused security strategy » Organizations are also investing in solutions that integrate security processes into developer workflows to more efficiently mitigate risk and reduce security incidents. 69% We expect to make significant investments 31% We expect to make moderate investments 100% 0% 68% 31% It’s a high priority (i.e., it will have a significant impact on our security program) It’s important, but not a high priority (i.e., we have higher security and/or AppDev priorities) 680+320= 310+690= » Top 10 priorities for securing cloud-native software development process 1. Improving application security testing 5. Discovering and inspecting APIs in source code 3. Applying runtime API security controls 7. Scanning open source code components and third-party libraries 9. Scanning production environments for misconfigurations 2. Detecting secrets that have been committed and stored in source code repositories 6. Remediating malware before deployment to production 4. Identifying software vulnerabilities before deployment to production 8. Remediating software vulnerabilities before deployment to production 10. Identifying malware before deployment to production 1. Addressing the sheer number of assets that are cloud-resident 3. Meeting prescribed best practices for the configuration of cloud-resident workloads and the use of cloud APIs 4. Meeting demands from the organization's customers/partners/supply chain 5. Automating security controls via integration with existing DevOps tools 2. Preparing for security incidents our organization may experience in the future » Top 5 business drivers for cloud security posture management » Most organizations believe that a platform approach will drive efficiency to enable security to scale with cloud-native development. 85% of organizations said a CNAPP will give them a consolidated approach for more efficient cloud security risk mitigation. 87% of organizations said a CNAPP helps drive efficiency in connecting application security processes to security posture management. 85+15+S 87+13+S About Cisco As a global industry leader in enterprise security solutions, Cisco Systems provides leading edge security solutions that protect corporate data from hackers. Modern solutions to managing mixed private and public cloud environments require management of the entire stack of technologies. Cisco Full Stack Observability solution innovatively dovetails with other Cisco stack solutions including Cisco’s CNAPP Cloud-Native Application Security solutions. Collectively, this solution provides an intelligent, comprehensive view of the total IT technology stack, providing high-resolution insights and metrics that allow businesses to run at their full potential. To see how Cisco can address your cloud-native application security needs from code to cloud, please see link below. learn more Having a high percentage of application code that is open source Identifying vulnerabilities in the code Applying an issued patch quickly once released Quickly remediating a vulnerability Understanding code composition and producing a software bill of materials Being victims of hackers targeting popular/commonly used open source software Trusting the source of the code 54% 39% 39% 38% 39% 41% 40% 3% 26% 27% 28% 31% 33% 34% 35% 37% 38% We haven’t experienced one of these incidents in the last 12 months Compromised privileged user credentials “Zero day” exploit(s) that took advantage of new and previously unknown vulnerabilities in internally developed code “Zero day” exploit(s) that took advantage of new and previously unknown vulnerabilities in open source software Secrets stolen from a source code repository Exploit of a misconfigured cloud service Exploit(s) that took advantage of known vulnerabilities in open source software Compromised services account credentials Exploit(s) that took advantage of known vulnerabilities in internally developed code Attacks that resulted in the loss of data due to the insecure use of APIs