{"id":112900,"date":"2020-06-24T09:00:02","date_gmt":"2020-06-24T16:00:02","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=112900"},"modified":"2020-07-31T08:12:46","modified_gmt":"2020-07-31T15:12:46","slug":"cloud-native-security-genome","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/06\/cloud-native-security-genome\/","title":{"rendered":"Mapping the Cloud Native Security Genome"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The only given in cloud is that technology and services are evolving at a rapid pace. Organizations are embracing a wide diversity in technologies, but securing this complexity can be challenging. Current approaches are not sustainable. Leaders need to envision a different future for cloud security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is what we have learned as we launch the results from our first annual <\/span><a href=\"http:\/\/go.paloaltonetworks.com\/stateofcloudnativesocial\"><i><span style=\"font-weight: 400;\">State of Cloud Native Security Report<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">. <\/span><\/i><span style=\"font-weight: 400;\">Conducted by Palo Alto Networks and sponsored by Accenture Security, it is the largest and most globally expansive market research dataset on cloud native security to date.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let's unravel the cloud native security genome as it stands today.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Cloud Is Multi-Everything and Will Stay That Way<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">When it comes to cloud, no one size fits all. Organizations are designing their cloud environments to be multi- and hybrid-cloud, to support multiple architectures, and to comply with multiple regulatory jurisdictions.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><strong>Organizations have opted for <i>hybrid<\/i> environments.\u00a0<\/strong><\/h6>\n<p><span style=\"font-weight: 400;\">Most organizations (57%) have a fairly even mix \u2013 with a 60\/40 split either way between public and private. <\/span><span style=\"font-weight: 400;\">But on average, 52% of workloads are hosted on public cloud servers and 48% on private.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><strong><i>Multi-<\/i>cloud is clearly the standard operating model.<\/strong><\/h6>\n<p><span style=\"font-weight: 400;\">Using more than one type of cloud platform is the standard \u2013 94% of all organizations use more than one type of cloud platform. A majority \u2013 60% \u2013 use between two and five.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><strong>Within those environments, workloads run on <i>multiple<\/i> compute options.<\/strong><\/h6>\n<p><span style=\"font-weight: 400;\">Almost all respondents, 93%, reported using <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/continuum-cloud-native-topologies\"><span style=\"font-weight: 400;\">multiple compute architectures<\/span><\/a><span style=\"font-weight: 400;\"> simultaneously. Respondents primarily rely on modern, cloud native architectures: platform-as-a-service, containers or containers-as-a-service account for 67% of all workloads. But virtual machines, often representing the lift-and-shift of monolithic applications to the cloud, still constitute the single largest compute category, accounting for 30% of workloads.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><strong>Change is the only constant.<\/strong><\/h6>\n<p><span style=\"font-weight: 400;\">Eighty percent of the respondents say their company\u2019s cloud is constantly evolving. This is not surprising since the workloads that move to the cloud tend to be the most dynamic; cloud architectures are designed to be elastic and ephemeral; cloud technologies are still rapidly evolving; and the <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/cloud\/visibility-governance-compliance\"><span style=\"font-weight: 400;\">regulatory environments<\/span><\/a><span style=\"font-weight: 400;\"> that govern cloud operations are still fluid.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><strong>Enterprises have geared for <i>multiple<\/i> regulatory jurisdictions.<\/strong><\/h6>\n<p><span style=\"font-weight: 400;\">The need to comply with local laws is directly influencing companies\u2019 cloud environments. For example, a large professional services firm might operate on a private cloud in Pakistan, likely a sub-scale operation, to comply with the banking regulations in that country. Organizations are actively designing their clouds so they are not caught flat-footed as they expand into new countries or as the countries they currently operate in create new regulations.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>The Current State of Cloud Security Is Unsustainable<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Security is among the top three stated reasons <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/05\/cloud-devops-needs-to-change-security\/\"><span style=\"font-weight: 400;\">slowing down<\/span><\/a><span style=\"font-weight: 400;\"> the shift to the cloud. Technical complexity and compliance being the other two. Security was listed as the top challenge in moving to the cloud for 39% percent of the respondents.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In spite of security being so critical to the digital transformation journey of an organization, only 18% of organizations are well prepared to deal with the security needs of the cloud by our measures. <\/span><span style=\"font-weight: 400;\">Unless cloud security practices become more efficient, digital transformation efforts will never reach their desired end-states.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><strong>Security threats are only increasing and becoming more complex.<\/strong><\/h6>\n<p><span style=\"font-weight: 400;\">Threats are outpacing cloud security tools and solutions for 75% of our respondents. The <\/span><span style=\"font-weight: 400;\">cloud can\u2019t be made secure by addressing any single threat. Organizations are aware they need to focus on multiple threat vectors. Not surprisingly, our survey respondents ranked eight different threats nearly equally when asked to pick the top three. This includes threats across data, identity, access privileges, applications, APIs and configurations.\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><strong>Organizations have one too many tools.<\/strong><\/h6>\n<p><span style=\"font-weight: 400;\">A majority of respondents \u2013 57% \u2013 use more than five cloud security tools to manage their cloud environments. Sixty-five percent of the organizations use security tools provided by the cloud service provider, but 73% of companies struggle to clearly delineate between their CSP's security responsibilities and their own. This likely results in duplication and overlap in the tools customers rely on, since the vast majority of these organizations also use open-source or commercial third-party tools.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><strong>Cloud security team structures are still in transition.<\/strong><\/h6>\n<p><span style=\"font-weight: 400;\">The good news is that 77% of companies have invested in specialized cloud security teams. Just as most companies are going through an <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/07\/4-practical-steps-shift-left-security\/\"><span style=\"font-weight: 400;\">evolution in their approach to DevOps<\/span><\/a><span style=\"font-weight: 400;\">, moving from batch to continuous releases, in the same way, companies are going through an evolution in how they approach cloud security. Almost half of respondents (47%) have both a centralized cloud security team and security experts embedded in delivery teams. Nearly a third have only centralized teams, and 22% have completely decentralized structures.\u00a0\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><strong>Security spend is already high and growing disproportionately with cloud spend.<\/strong><\/h6>\n<p><span style=\"font-weight: 400;\">Two-thirds of surveyed organizations invested more than 10% of their 2019 cloud budget in securing their cloud estates. The spend on cloud security seems to grow with cloud spend. Of companies that spend more than $100 million on cloud, 34% reported that 16% of their cloud spend goes to security. This is clearly not sustainable. Security tends to be only 5\u201310% of the IT spend in traditional data center environments. In the cloud, we should be targeting a sub-5% spend, given that CSPs like AWS, Azure and Google Cloud take care of the infrastructure security of their stacks.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>CISOs Need to Think About Cloud Security Differently<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">For successful security operations, leaders must take a different approach than the status quo suggested by our data. Below are five main takeaways based on practices common to companies with the highest security preparedness rankings. Details on how rankings were developed are available in the survey.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><strong>1. Every company in the cloud is in the software business.<\/strong><\/h6>\n<p><span style=\"font-weight: 400;\">Cloud native app development requires faster delivery methods like DevOps, and those practices must be supported by automation to remain secure.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><strong>2. Cloud security is a partnership between security and DevOps teams.<\/strong><\/h6>\n<p><span style=\"font-weight: 400;\">In order to secure cloud native applications and cloud environments, security needs to be addressed before deployment. Investments should prioritize tools that can integrate with existing development tools and that quickly pass feedback to the development teams to address security issues before deployment.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><strong>3. The cloud is complex. Managing it requires simplicity.<\/strong><\/h6>\n<p><span style=\"font-weight: 400;\">Build toward managing the diversity by streamlining. At highly prepared companies with 11 or more security tools, 52% of employees said a high number of tools made it more difficult to prioritize risks and prevent threats. Then consider that a little over half of companies investing more than $100 million in cloud use just five or fewer cloud security tools.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><strong>4. Embed security across the application lifecycle.<\/strong><\/h6>\n<p><span style=\"font-weight: 400;\">Almost half of highly prepared companies (45%) have embedded security into DevOps workflows. The results \u2013 more security control and more secure code \u2013 speak for themselves, and show that organizations can speed up their response rate to events with shift-left security.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><strong>5. Build toward a consolidated platform early and avoid tool sprawl.<\/strong><\/h6>\n<p><span style=\"font-weight: 400;\">Not every cloud platform, process or computing model needs its own tool. There is an increasing industry trend to <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/05\/cloud-secure-cloud-native-applications\/\"><span style=\"font-weight: 400;\">consolidate security functions<\/span><\/a><span style=\"font-weight: 400;\"> into single platforms. At <\/span><span style=\"font-weight: 400;\">organizations with the highest level of security preparedness, 51% said that using a single, comprehensive cloud native security solution would improve their security posture.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Additional Insights into the Cloud Native Security Genome<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">In today's world of rapidly evolving cloud environments, CISOs and IT leaders need as much insight as possible to envision new ways to manage cloud security. The Palo Alto Networks <\/span><a href=\"http:\/\/go.paloaltonetworks.com\/stateofcloudnativesocial\"><span style=\"font-weight: 400;\">2020 State of Cloud Native Security Report<\/span><\/a><span style=\"font-weight: 400;\"> is a great starting point for those new ways of thinking.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">I am interested to know if these stats align with your experiences with cloud security. Please feel free to share your views on Linkedin or <\/span><\/i><a href=\"https:\/\/www.linkedin.com\/in\/rssoods\/detail\/recent-activity\/shares\/\" rel=\"nofollow,noopener\" ><i><span style=\"font-weight: 400;\">ping me<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> directly.<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We examine the cloud native security genome, informed by in-depth primary research.<\/p>\n","protected":false},"author":663,"featured_media":109520,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768],"tags":[7153,1166,6890],"coauthors":[7152],"class_list":["post-112900","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-cloud","tag-cloud-native-security-report","tag-cloud-security","tag-prisma-cloud","cloud_sec_category-devsecops"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/04\/pan_generic-gtm-social_prisma-blog-350x300-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/112900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=112900"}],"version-history":[{"count":6,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/112900\/revisions"}],"predecessor-version":[{"id":117090,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/112900\/revisions\/117090"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/109520"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=112900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=112900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=112900"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=112900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}