* [Blog](https://www2.paloaltonetworks.com/blog) * [Cloud Security](https://www2.paloaltonetworks.com/blog/cloud-security/) * 一份发人深省的\[云原生安全\]现状报告... # 一份发人深省的\[云原生安全\]现状报告 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fcloud-native-security-research-2024%2F%3Flang%3Dzh-hans) [](https://twitter.com/share?text=%E4%B8%80%E4%BB%BD%E5%8F%91%E4%BA%BA%E6%B7%B1%E7%9C%81%E7%9A%84%5B%E4%BA%91%E5%8E%9F%E7%94%9F%E5%AE%89%E5%85%A8%5D%E7%8E%B0%E7%8A%B6%E6%8A%A5%E5%91%8A&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fcloud-native-security-research-2024%2F%3Flang%3Dzh-hans) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fcloud-native-security-research-2024%2F%3Flang%3Dzh-hans&title=%E4%B8%80%E4%BB%BD%E5%8F%91%E4%BA%BA%E6%B7%B1%E7%9C%81%E7%9A%84%5B%E4%BA%91%E5%8E%9F%E7%94%9F%E5%AE%89%E5%85%A8%5D%E7%8E%B0%E7%8A%B6%E6%8A%A5%E5%91%8A&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/cloud-security/cloud-native-security-research-2024/?lang=zh-hans&ts=markdown) [](mailto:?subject=一份发人深省的[云原生安全]现状报告) Link copied By [Steve Giguere](https://www.paloaltonetworks.com/blog/author/steve-giguere/?lang=zh-hans&ts=markdown "Posts by Steve Giguere") Aug 16, 2024 1 minutes This post is also available in: [English (英语)](https://www2.paloaltonetworks.com/blog/cloud-security/cloud-native-security-research-2024/ "切换到 英语(English)") [繁體中文 (繁体中文)](https://www2.paloaltonetworks.com/blog/cloud-security/cloud-native-security-research-2024/?lang=zh-hant "切换到 繁体中文(繁體中文)") [日本語 (日语)](https://www2.paloaltonetworks.com/blog/cloud-security/cloud-native-security-research-2024/?lang=ja "切换到 日语(日本語)") [한국어 (韩语)](https://www2.paloaltonetworks.com/blog/cloud-security/cloud-native-security-research-2024/?lang=ko "切换到 韩语(한국어)") 如果你也和我一样,可能会对各式各样的\*"现状"\*报告感到审美疲劳。我说的只是网络安全领域的报告 - 从 SBOM 到开源,再到我们自己的《2024 年云原生安全报告》,不一而足。 尽管如此,每份报告都充满了耐人寻味的启示,让人感受到调查所在生态系统的温度。我们的也不例外。如果您是对云计算投资激增的众多企业之一 - 可能每年在云服务上的投资超过 1000 万美元 - 那么这份报告至少可以让您放心,您并不孤单。 首先,让我们来谈谈枯燥但必不可少的可信度细节。 《2024 年云原生安全现状报告》展示了来自 10 个国家 2,800 多名受访者的调查数据。这些受访者有的来自大企业,有的来自中小型组织,其中既有高管领导,也有开发、IT 和安全职能部门的从业人员。洗手间在大厅尽头左侧,如果发生火灾,请到 E 停车场集合。都知道了吗?是时候进入正题了。 ## 我们与人工智能的爱恨情仇 任何编写代码的人都尝试过类似的提示: "我正在做一个 Terraform 项目,需要按照特定要求配置 AWS EC2 实例:类型应该是't2.micro',位于'us-east-1'区域内,包含'Name'标签'MyInstance'和'Environment'标签'Development'。能否提供定义这个资源的 Terraform 代码片段?" (摘自 [The New Stack](https://thenewstack.io/generative-ai-tools-for-infrastructure-as-code/) 上的精彩文章。) 当然,它也很好地创造了一些可能有用的东西!事情还不止于此。生成代码的能力就像是引诱开发人员的火箭燃料,直接影响着我们如何激励他们的行为。时间是一个因素,新的竞争性功能的上市时间也是一个因素。 尽管 100% 的受访者都接受了人工智能辅助应用程序开发(和安全),比如现有的各种[辅助机器人](https://www.paloaltonetworks.com/company/press/2024/palo-alto-networks-delivers-more-autonomous-cybersecurity-through-copilots-for-strata--prisma-and-cortex-platforms),但许多人担心[人工智能生成的代码](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity)会带来安全风险,这一点也不足为奇。人工智能,尤其是公开的 [LLM](https://www.paloaltonetworks.com/cyberpedia/large-language-models-llm),是一台"垃圾进垃圾出"的机器。由于公共领域中的安全编码示例少之又少,业界显然担心开发人员可能会过于依赖人工智能,无意中引入更多不安全的默认设置,因为如果不是这样,他们的代码可能无法正常运行。 尽管存在公认的风险,但这种一致性接受表明,可能需要(额外的)监督来平衡更快的创新节奏和安全。 我们与 [AI](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai) 的关系还不止于此。继去年瞄准云原生生态系统的攻击上升之后,近一半的安全专业人士受访者预计人工智能驱动的供应链攻击将崛起,同样多的受访者预测攻击将躲过传统的检测技术。 各企业看清了这种认知上的偏差,人工智能既是创新的推动力,也是潜在的攻击载体,因此需要在追求人工智能效益与严格的安全措施之间取得平衡。 ## 我的数据在哪里? 据报道,如果有人工智能的协助,[数据泄露](https://www.paloaltonetworks.com/cyberpedia/data-breach)事故可能会增加,但尚未得到证实。超过 60% 的受访企业报告了大幅增加。事实上,45% 的企业报告称,高级持续性威胁 (APT) 和可以长期不被发现的隐形攻击有所增加。这不仅需要主动监控和先进的威胁检测与响应,还迫切需要在云环境中采取强大的[数据安全](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security)措施。 数据是皇冠上的明珠!虽然拒绝服务攻击(包括勒索软件)仍然是一个现实的威胁,但我们在云原生墙内藏着的数据才是许多攻击者的目标。 城墙建得更高了 - 门口有猛兽把守 - 我们的守卫也增加了一倍,使整个城堡的可观察性更加扑朔迷离。然而,许多企业实际上并不知道金子在哪里。 这似乎很难让人相信,但仍有 50% 的企业依靠人工审核来识别和[分类云中的敏感数据](https://www.paloaltonetworks.com/cyberpedia/data-classification)。我们显然需要现代化的解决方案,尤其是当我们考虑到,除了我们从托管服务中了解到的数据外,我们的云景中还潜伏着非托管数据解决方案和[影子数据](https://www.paloaltonetworks.com/cyberpedia/shadow-data)。一个潜伏在 Kubernetes 集群中的简单容器化数据库缓存了[个人身份信息 (PII)](https://www.paloaltonetworks.com/cyberpedia/pii),需要发现和分类,而只有自动化才能解决这个问题,才能检测和保护我们未知的未知。 在我们已知的未知中,就包括人工智能在内部解决方案中的广泛应用。我们知道,这给数据安全带来了新的刺激挑战 - 例如,确保对训练和代表我们的模型和服务的数据进行受控访问。除此之外,还要建立和监控已部署的人工智能辅助应用程序清单。 我们谈论的也不仅仅是客户数据/金子。虽然只有 38% 的企业报告在[机密管理](https://www.paloaltonetworks.com/cyberpedia/secrets-management)方面遇到困难,但更有 43% 的企业表示,在过去一年里遇到的机密暴露增加了。 ## 用工具解决! 如果您从未参加过 [CISO Series "Super Cyber Friday"](https://cisoseries.com/category/super-cyber-friday/)的活动,我真心推荐您参加。这些都是与网络安全专家进行的互动性极强而且非常有趣的访谈。具体来说,活动有一个"BAD IDEA"环节,听众可以提交某个问题的最差解决方案。"用工具解决"对于这样一个环节来说是一种具有讽刺意味的高质量回应。 接受调研的企业平均使用 16 种云安全工具,但 90% 的受访者表示,使用的单点工具数量过多会造成安全盲点。这一现实正在影响他们确定风险优先级和防止威胁破坏安全效果的能力。 但讽刺意味还不止于此。几乎所有的安全专业受访者都认为,自己的企业需要一种解决方案,能够自动识别最有可能致使攻击得逞的漏洞和错误配置,并立即采取补救措施。听起来他们可能需要一个 [CNAPP](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform)。 ## 让我们来谈谈威胁吧!我们谈谈你和我! DevSecOps 究竟什么时候才能实现?我赌 100 块钱 [2037 年 12 月](https://en.wikipedia.org/wiki/Year_2038_problem)。在 SecOps 和 DevOps 团队之间,"合作共赢"的故事还没有上演,因为超过 80% 的 DevOps 仍将安全视为一个制约因素。现实就是,制约是安全团队的工作。他们才应该是一个制约因素。这是必要之恶。制约的问题更可能是将安全集成到开发人员环境中的方法 - 在某种程度上也包括开发人员的思维 - 没有达到应有的精简程度。 挣扎的双方都缺乏同情心。超过 90% 的安全团队认为开发人员只要编写安全的代码就行了。问题解决了!实际上,成功的因素介于两者之间。人工智能将成为 DevSecOps 的强大融合剂,还是会在以惊人的速度推动开发的同时加剧问题,我们将拭目以待。 ## 发展方向 在企业应对复杂的云原生安全问题时,本报告为强化其安全态势提供了宝贵的建议: * 从云迁移行动的一开始就优先考虑安全性,将其纳入整体战略,避免漏洞、数据泄露和违规处罚。 * 鉴于云服务市场的复杂性和多样性,彻底研究工具和供应商,评估最符合企业需求、预算和战略目标的选项。 * [促进开发团队和安全团队之间的合作](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops),对齐优先级并精简流程,减少冲突并确保高效、安全的应用程序部署。 * 云原生应用中的资源和数据蔓延是真实存在的。对于各种规模的企业而言,从人工到现代化都是一条必经之路。 * 随着云技术不断重塑数字环境,企业必须时刻警惕,积极主动地制定安全战略。在加强防御的同时拥抱创新,企业就可以驾驭云原生时代的复杂性,释放全部潜力来实现其增长和转型。 ## 了解更多 千万不要错过这份非同一般的 [2024 年云原生安全现状报告](https://www.paloaltonetworks.cn/state-of-cloud-native-security)。马上下载报告。 ### Subscribe to Cloud Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language