{"id":104097,"date":"2019-12-06T06:00:52","date_gmt":"2019-12-06T14:00:52","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=104097"},"modified":"2019-12-05T10:25:42","modified_gmt":"2019-12-05T18:25:42","slug":"cloud-native","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2019\/12\/cloud-native\/","title":{"rendered":"How Cloud Native Security Platforms Can Rescue Cloud Native"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Many organizations are able to push the boundaries of software innovation to new levels through cloud native adoption. What used to represent a year\u2019s worth of deliverables for developers is now being met in a matter of months \u2014 even weeks. Like an astronaut stepping out into a brave new world, we put our stake in the sand, hold our heads high and embrace this bright new future.<\/span><\/p>\n<p><b>\u201cOne small step for man, one giant leap for mankind.\u201d \u2014 Neil Armstrong<\/b><\/p>\n<p><span style=\"font-weight: 400;\">But security teams are challenged by cloud native. With a growing number of apps running on more platforms in more places than ever before, cloud native is an ever-expanding, omnipresent multiverse. Traditional security methodologies are no longer relevant in this new landscape, as security is being pushed closer to the workloads and \u201cperimeter\u201d is as abstract a concept as the cloud itself.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Because security and development teams have traditionally worked in silos, advancements in application development were often implemented in the absence of advancements in security methodologies to support them. This created significant gaps and left organizations more vulnerable than ever \u2014 that is, until <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-devsecops\"><span style=\"font-weight: 400;\">DevSecOps<\/span><\/a><span style=\"font-weight: 400;\"> entered the universe, bringing hope.<\/span><\/p>\n<p><b>\u201cBeam me up, Scotty.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">DevSecOps is the perfect match for cloud native. It epitomizes everything we love about cloud native by nature: It is integrated, multifaceted and focused on automation and speed. A <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/esg-research-on-continuous-integration-continuous-delivery.html\"><span style=\"font-weight: 400;\">recent research survey from ESG<\/span><\/a><span style=\"font-weight: 400;\"> found automating security via CI\/CD integration, i.e. DevSecOps, is becoming the industry standard approach for organizations looking to secure cloud native applications.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having this gold standard established is a good thing \u2014 it gives organizations a crystal-clear goal to work towards. But although the destination has been identified, the path to getting there is still shrouded in mystery.<\/span><\/p>\n<p><b>\u201cHouston, we have a problem.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The security point tools that have flooded the market in recent years showed promise to secure cloud native applications. Unfortunately, their fragmented nature \u2014 each of them only accounting for part of the problem \u2014 runs counter to the goal of an integrated DevSecOps culture, which is a requirement for <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/11\/cloud-native-security-platform\/\">effectively securing cloud native apps<\/a>. The good news is leveraging a fully integrated <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cloud-security\"><span style=\"font-weight: 400;\">Cloud Native Security Platform (CNSP)<\/span><\/a><span style=\"font-weight: 400;\">, which weaves consistent security throughout the entire CI\/CD pipeline, can actually unite DevOps, infrastructure and security teams alike under one homogenous workflow. This makes DevSecOps a natural evolution rather than a forced deviation.<\/span><\/p>\n<p><b>\u201cTo infinity and beyond!\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The surge of cloud native adoption is mirrored by the growth and popularity of <\/span><a href=\"https:\/\/events19.linuxfoundation.org\/events\/kubecon-cloudnativecon-north-america-2019\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">KubeCon + CloudNativeCon North America<\/span><\/a><span style=\"font-weight: 400;\">. These modern application workflows bring with them the promise of accelerated technological achievement \u2014 however, it is absolutely critical that this is bound by a proper security foundation, or companies will see cloud native as a rocket ship that\u2019s destined to hit the dust.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s why we partnered with Cloud Native Computing Foundation (CNCF) for KubeCon 2019 in order to help organizations harness the full potential of cloud native and adopt the right security tools and capabilities in the process.\u00a0<\/span><\/p>\n<p><b>\u201cMay the force be with you, always.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s safe to say the technology industry is transforming to embrace cloud native. The question remains if organizations can adopt effective security controls to keep pace.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Learn more about <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/cloud\"><span style=\"font-weight: 400;\">Prisma Cloud, the most comprehensive cloud native security platform in the industry<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s a good idea to leverage a fully integrated Cloud Native Security Platform, which weaves consistent security throughout the entire CI\/CD pipeline.<\/p>\n","protected":false},"author":663,"featured_media":103135,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768],"tags":[6901],"coauthors":[6902],"class_list":["post-104097","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-cloud","tag-cloud-native-security-platform"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/11\/Prisma-social_blog-600x300.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=104097"}],"version-history":[{"count":3,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104097\/revisions"}],"predecessor-version":[{"id":104213,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104097\/revisions\/104213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/103135"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=104097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=104097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=104097"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=104097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}