{"id":109519,"date":"2020-04-17T06:00:13","date_gmt":"2020-04-17T13:00:13","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=109519"},"modified":"2020-04-15T12:09:52","modified_gmt":"2020-04-15T19:09:52","slug":"cloud-security-2021","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/04\/cloud-security-2021\/","title":{"rendered":"Cloud Security 2021: 4 Key Trends You Shouldn\u2019t Miss"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Cloud services have become a multi-billion dollar industry \u2013 and the growth of this burgeoning market shows no sign of abating. With <\/span><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-11-13-gartner-forecasts-worldwide-public-cloud-revenue-to-grow-17-percent-in-2020\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Gartner forecasting<\/span><\/a><span style=\"font-weight: 400;\"> a 17% year-over-year surge in public cloud revenue for 2020, it\u2019s clear that the world is trending toward wider cloud adoption across all industries. Looking ahead to cloud security 2021 and beyond, we should likely begin to see an increasing surge of enterprises \u2013 even governments \u2013 moving workloads to the cloud.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For many organizations, the shift to the cloud also means completely reimagining and optimizing their stacks to achieve a cloud-native implementation. This means that, in the years ahead, a few new security trends will likely take hold.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To ensure you\u2019re prepared for the rapidly approaching cloud-native future, here are four cloud security trends that IT and security leaders should keep an eye on.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">1. Cloud security consolidation will continue to build steam.\u00a0<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Organizations understand the inherent risk in using dozens of security products to manage cloud infrastructure. Even a small organization might manage 15-20 separate security tools. On the other end of the spectrum are some of the largest organizations, which often find themselves fatigued by the effort to manage more than 120 separate security products. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Security teams are hungry for solutions that will provide risk clarity for their cloud presence. Cloud providers like Azure, Google, Alibaba and AWS have their own native security features \u2013 but these nascent offerings are limited in what they are able to protect and are often not well-integrated. Most organizations use multiple cloud service providers in addition to their own private clouds or on-premises hardware. This hybrid operating model is a security problem the cloud service providers are not yet able to address.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Looking at the year ahead and beyond, we\u2019ll begin to see the rise of <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/03\/cloud-native-security-platform-2\/\"><span style=\"font-weight: 400;\">cloud native security platforms<\/span><\/a><span style=\"font-weight: 400;\"> (CNSPs). These platforms will enable security teams to manage all their security across public, private and hybrid clouds from a single console. Siloed security solutions will be integrated into these comprehensive platforms: capabilities such as governance and compliance, threat detection and response, container security, data loss prevention and serverless security will all live in a single pane of glass. Watch for these platforms to develop and mature over the next two years.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">2. Machine learning (ML) for security will evolve beyond being a buzzword.<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Machine learning has long been one of the biggest buzzwords in technology. Much of the marketing hype has positioned it as a near-magical solution for just about any challenge. However, in practice, ML \u201csolutions\u201d have yet to offer many practical applications for security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This will change over the next 18 months, as we start to see examples of ML deployed within some very specific use cases. It will start to show up in areas like data classification, malware detection and automated reasoning, i.e., ML that can evaluate security configurations from multiple different angles, as an attacker would. A great example would be the area of identity and access management. Automated reasoning will be utilized to determine if policies are effective, overly permissive, etc. <\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">3. Security teams will be forced to shift left by the increasing speed of DevOps.<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Most organizations understand the tactical benefits of <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/07\/4-practical-steps-shift-left-security\/\"><span style=\"font-weight: 400;\">shift left<\/span><\/a><span style=\"font-weight: 400;\">, but adoption has lagged. However, as cloud security consolidation progresses and CNSPs become more common, security teams and their DevOps counterparts will have a more viable path to shift left. These platforms will give organizations the ability to seamlessly integrate security into the development pipeline, and will ensure cloud-agnostic protections across all clouds.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, many organizations are rapidly adopting infrastructure as code (IaC) as they attempt to automate more of their build processes in the cloud. When teams shift to IaC, they can avoid the manual creation and configuration of infrastructure in favor of writing code \u2013 IaC templates are a great way to consistently enforce security standards. CNSPs can scan IaC templates for issues in the development pipeline and also offer automated remediation to quickly address any security issues in the cloud environment.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The challenge today, however, is that DevOps teams are not <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/03\/cloud-devops-plugins\/\"><span style=\"font-weight: 400;\">reviewing IaC templates for misconfigurations<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><a href=\"http:\/\/unit42.paloaltonetworks.com\/cloud-threat-report-intro\"><span style=\"font-weight: 400;\">Recent Unit 42 research<\/span><\/a><span style=\"font-weight: 400;\"> indicates while IaC offers security teams a predictable way to enforce security standards, this powerful capability remains largely unharnessed. In the same report, Unit 42 researchers found nearly 200,000 insecure IaC templates in use.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">4. Vendor consolidation will extend visibility.<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">The broad adoption of a multi-cloud strategy creates visibility issues. As we move into the new decade, security teams and IT leaders will continue to search for ways to gain the level of visibility they once enjoyed on-premises. Highly dynamic cloud resources make visibility difficult.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, security platforms that leverage cloud provider APIs will offer richer context for cloud based workloads, including containers, serverless and Platform as a Service (PaaS). Much of this will be fueled by the consolidation of smaller or single-function vendors (for example, providers offering cloud workload protection or data loss prevention). By 2021, these niche vendors will likely find themselves choosing between acquisition or liquidation because the market is beginning to demand integrated platforms vs. point solutions.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">Prepare for the future of cloud native security \u2013 today.\u00a0<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">As we enter a new era in cloud security, there\u2019s little doubt that public cloud platforms will continue to evolve at warp speed. This unprecedented rate of change will force organizations to continually rethink the way they build and manage their applications. The accessibility and ease-of-use provided by the cloud has opened the door to unfettered innovation \u2013 empowering business owners to move fast and deliver enormous value.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This accessibility and ease of use has also had the adverse effect of rendering many traditional security and governance models all but obsolete. As a result, security teams need to reevaluate existing processes and tools to ensure they are able to keep up with both the risks and demands the business requires in the age of cloud native.\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">For more about the future of cloud security, view sessions from the <\/span><\/i><a href=\"https:\/\/vshow.on24.com\/vshow\/Palo_Alto_Networks\/registration\/16700\" rel=\"nofollow,noopener\" ><i><span style=\"font-weight: 400;\">Cloud Native Security 2020 Virtual Summit<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> for free and on-demand.\u00a0<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">This article originally appeared in <\/span><\/i><a href=\"https:\/\/thenewstack.io\/cloud-security-2021-4-key-trends-not-to-miss\/\" rel=\"nofollow,noopener\" ><i><span style=\"font-weight: 400;\">The New Stack. <\/span><\/i><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security is a fast-changing industry. Cloud security 2021 covers the trends you need to know to stay ahead in the coming year and beyond.<\/p>\n","protected":false},"author":623,"featured_media":109520,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768],"tags":[7009,1166,6890,232],"coauthors":[6679],"class_list":["post-109519","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-cloud","tag-30-days-of-cloud","tag-cloud-security","tag-prisma-cloud","tag-trends"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/04\/pan_generic-gtm-social_prisma-blog-350x300-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/623"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=109519"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109519\/revisions"}],"predecessor-version":[{"id":109536,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109519\/revisions\/109536"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/109520"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=109519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=109519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=109519"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=109519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}