{"id":118673,"date":"2020-09-17T06:00:13","date_gmt":"2020-09-17T13:00:13","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=118673"},"modified":"2020-09-16T10:49:11","modified_gmt":"2020-09-16T17:49:11","slug":"cloud-native-zero-trust","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/09\/cloud-native-zero-trust\/","title":{"rendered":"Cloud Native Zero Trust: Securing Applications"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Despite their ubiquity, cloud native applications are still not necessarily widely understood, which can create gaps for security teams tasked with protecting them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These apps are built with newer technologies like containers and microservices, which allow organizations to deploy and iterate faster than ever before. It's that same speed that defies traditional approaches to <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/zero-trust\"><span style=\"font-weight: 400;\">Zero Trust<\/span><\/a><span style=\"font-weight: 400;\"> models: resources are continually shifting, services are in constant communication and hybrid architectures are difficult to map. This creates serious obstacles for identification and validation.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In order to adapt, organizations are \"<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/07\/4-practical-steps-shift-left-security\/\"><span style=\"font-weight: 400;\">shifting left<\/span><\/a><span style=\"font-weight: 400;\">\" and integrating security touchpoints in the development pipeline. As part of those touchpoints, two critical security requirements for cloud native Zero Trust are container images and runtime defense.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Visibility Into Container Images<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In a cloud native world, developers move fast. They can do this thanks to things like containers \u2013 a standalone file or package of files with components needed to run an application. At rest, it's called a container image. They're handy for DevOps teams, but because they're ephemeral by nature, it can be difficult for an organization to grasp what they're used for and where they originate.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In some cases, developers use public image repositories like <\/span><a href=\"https:\/\/www.docker.com\/products\/docker-hub\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Docker Hub<\/span><\/a><span style=\"font-weight: 400;\"> to generate the base layer of an application. While these public repositories can be an efficient resource, they sometimes resemble a vending machine without a window, with little to no information provided about what item you're selecting.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ensuring developers have the tools to secure container images at every stage in the development lifecycle is a great first step to achieving Zero Trust. One-time vulnerability scanning, while useful, isn't a complete solution to this problem. In order to ensure existing container images deployed across the environment don't contain malicious files, teams need the ability to quickly differentiate between what is good and what is not.\u00a0<\/span><\/p>\n<figure id=\"attachment_118687\" aria-describedby=\"caption-attachment-118687\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:62%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-118687 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/09\/images.png\" alt=\"This screenshot of Prisma Cloud shows a monitor\/vulnerabilities screen that displays information about container image vulnerability scanning\" width=\"900\" height=\"558\" \/><\/span><\/div><figcaption id=\"caption-attachment-118687\" class=\"wp-caption-text\">Image 1: Container image vulnerability scanning in Prisma Cloud<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Consistent image vulnerability scanning must be combined with \"image trust\" to obtain the visibility and control necessary for Zero Trust in cloud native applications. Image trust policies allow users to specify which container images are safe to run within their environment, either by image or by image layers. Prisma Cloud <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/05\/cloud-container-image-trust-groups\/\"><span style=\"font-weight: 400;\">Trust Groups<\/span><\/a><span style=\"font-weight: 400;\"> provide a cohesive set of capabilities for image security to achieve Zero Trust.<\/span><\/p>\n<figure id=\"attachment_118700\" aria-describedby=\"caption-attachment-118700\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:34.56%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-118700 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/09\/trust-audits.png\" alt=\"This Monitor \/ Compliance screenshot from Prisma Cloud shows information about trusted and untrusted container images in Prisma Cloud. Container images are a critical security point for cloud native Zero Trust. \" width=\"900\" height=\"311\" \/><\/span><\/div><figcaption id=\"caption-attachment-118700\" class=\"wp-caption-text\">Image 2: Differentiation between trusted and untrusted container images in Prisma Cloud<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Protecting Running Applications<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While continuously scanning images and verifying their trustworthiness is important, protections need to be continued into runtime as well.\u00a0\u00a0<\/span><\/p>\n<figure id=\"attachment_118713\" aria-describedby=\"caption-attachment-118713\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:62.11%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-118713 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/09\/carts.png\" alt=\"This screenshot of Prisma Cloud shows an example (carts:0.4.8) of a container runtime with blocked network activities. Runtime defense is a critical security point for cloud native Zero Trust. \" width=\"900\" height=\"559\" \/><\/span><\/div><figcaption id=\"caption-attachment-118713\" class=\"wp-caption-text\">Image 3: Container runtime with blocked network activities in Prisma Cloud<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Having continuous visibility into running applications becomes of the utmost importance to validate that they are operating within defined specifications and ensure that they are only communicating with relevant entities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Creating a model of known-good processes and network connections, then alerting on or blocking any deviations from this model, helps give organizations full control over how an application performs.<\/span><\/p>\n<figure id=\"attachment_118726\" aria-describedby=\"caption-attachment-118726\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:62.11%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-118726 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/09\/infra.png\" alt=\"This screenshot of Prisma Cloud shows a window labeled &quot;Explore infra\/my.jenkins.latest&quot; and presents an example of container runtime process modeling. \" width=\"900\" height=\"559\" \/><\/span><\/div><figcaption id=\"caption-attachment-118726\" class=\"wp-caption-text\">Image 4: Container runtime process modeling in Prisma Cloud<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Prisma Cloud provides a comprehensive solution of runtime protections \u2013 including process, networking and file system modeling \u2013 to ensure that cloud native applications, including any combination of VMs, containers, applications on Kubernetes, or serverless applications, stay within spec and in line with any <\/span><a href=\"https:\/\/docs.paloaltonetworks.com\/best-practices\/10-0\/zero-trust-best-practices\/zero-trust-best-practices\"><span style=\"font-weight: 400;\">Zero Trust best practices<\/span><\/a><span style=\"font-weight: 400;\"> put in place.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Putting It Together<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Securing cloud native applications should be an integral part of your Zero Trust infrastructure. These applications play an integral role in how an organization interfaces with the world and should be protected as such.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Container image and runtime protections are components of an enterprise Zero Trust strategy. Watch as Palo Alto Networks Founder and CTO Nir Zuk <\/span><a href=\"https:\/\/youtu.be\/zzZ4q9DSnbg?t=650\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">explains how it all fits together<\/span><\/a><span style=\"font-weight: 400;\">. And be sure to check out the rest of the blogs in our <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/zero-trust-throughout-your-infrastructure\/\"><span style=\"font-weight: 400;\">Zero Trust series<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"zzZ4q9DSnbg\" ><\/lite-youtube><\/div><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two critical security points for cloud native Zero Trust are container images and runtime defense. <\/p>\n","protected":false},"author":663,"featured_media":118674,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768],"tags":[6504,6890,73,7129],"coauthors":[7098],"class_list":["post-118673","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-cloud","tag-container-security","tag-prisma-cloud","tag-zero-trust","tag-zero-trust-throughout-your-infrastructure","cloud_sec_category-cloud-workload-protection-platform"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/09\/Flannel-blog.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/118673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=118673"}],"version-history":[{"count":1,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/118673\/revisions"}],"predecessor-version":[{"id":118739,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/118673\/revisions\/118739"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/118674"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=118673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=118673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=118673"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=118673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}