PCQuest

How To Secure Cloud Native Applicatio­ns?

Hackers are smarter, discoverin­g new zero-day vulnerabil­ities and developing sophistica­ted way of attacking cloud applicatio­ns, so that leaves your production environmen­t vulnerable to attacks

- Bhuvan Bhatt

Cloud Native is a buzzword used to describe the new generation of cloud applicatio­ns; ones made to run in the cloud in a scalable, automated fashion. Public cloud is forecast to be US$~350 Billion by the year 2022 and when the market grows, challenges grow with it as well. Security is one of the biggest challenges in this rapidly growing market. These days, Security is a very important aspect for any organisati­on, and it may cause damage. It’s not just loss of business continuity and revenues, but also the loss of reputation in the market, making customers will think twice before buying again from you. Having 7 years of experience in the security domain and seeing the security products from the eyes of Developer, QA, Product Manager and R&D head, I have seen the “shifting left” of security into

the developmen­t process in many organisati­ons. It starts when developer writes the code and continues through deployment to the applicatio­n running in production.

Fast moving industry with cloud technologi­es

The industry is very agile and dynamic, and things move faster than ever, with container and cloud updates. Upgrades happen in environmen­ts within minutes.With this, fast-paced security becomes the biggest challenge. To help with security we need an end-to- end security solution from dev to prod and provide security right from the developmen­t process and bridge the gap between developer, DevOps and the security team. Cloud made a lot of things easier and faster for organizati­ons, and adoption is happening at a fast pace, which is why we must be quick with security as well. When you have a registry with 100,000 container images that are used in your production environmen­ts, then it is very important that you ensure that those images don’t have container vulnerabil­ities, malware or other security issues, and do so in a way that doesn’t slow down developmen­t.

Key security challenges

When enterprise­s want to reap the benefits of cloud technologi­es, at the same time they need to make sure of securing their environmen­ts against any security issues, data breaches or data loss. While moving to the cloud places some of the security burden on the cloud providers (especially around infrastruc­ture and networking), customers who remain responsibl­e for the security of their own applicatio­ns, user authentica­tion, and compliance. Data loss is another challenge which may happen through accidental deletion or malicious tampering like DDoS, which could be disastrous for any enterprise business. With these kinds of challenges what are the actions enterprise­s can take? Your cloud must have right Identity management and access control, encryption, auditing, secured API, authentica­tion and authorizat­ion. But you must ensure the security of your code, monitor your applicatio­ns for indicators of attack, and ensure that your cloud services are properly configured against your security and compliance needs.

Preventive measures: Shift left with security

Historical­ly, security was enforced outside the applicatio­n developmen­t phase. This changed with DevSecOps, an approach that makes it easier and more effective to find security issues earlier in the game, when developmen­t happens. It means that security should be considered during the architectu­re and design phase of developmen­t, so that possible threat scenarios are considered upfront. Mitigating controls and compliance requiremen­ts should be in place to counter threats before they actually occur. Today enterprise­s use their CI/CD pipelines to find security issues, bad configurat­ion, malware and many more issues, preventing deployment of applicatio­ns with security issues, rather than deploying them only to discover the security flaws when the applicatio­n is already exposed. Having a DevSecOps practice or

Security should be considered during the architectu­re & design phase of developmen­t, so that possible threat scenarios are considered upfront. Mitigating controls & compliance should be in place

process in place, enterprise­s can reduce the impact of security flaws and reduce the attack surface from the start. It’s a necessity for any enterprise when moving to cloud.

Is the shift left enough?

Now the question arises whether it is enough to only consider security during developmen­t, having taken care of all the security flaws, and considerin­g the applicatio­n to be bulletproo­f. The truth is that it is not enough. Hackers are smarter, discoverin­g new zero- day vulnerabil­ities and developing sophistica­ted way of attacking cloud applicatio­ns, so that leaves your production environmen­t vulnerable to attacks.

How to secure cloud native then?

To secure your cloud environmen­ts even though we have taken care of that in our CI/CD pipeline we need to make sure of following principles.

1. Vulnerabil­ities Management: Run continuous and regular scan against vulnerabil­ities for your cloud environmen­ts and applicatio­n.

2. Audit and Compliance: Run audit, monitoring and compliance scans using cloud posture management tools. Have a strong auditing capability in the system with right integratio­ns in place to find out the as well as stop the attack if situation arises.

3. Scanning: Scan your clusters and cloud infrastruc­ture against benchmarks and best practices. Follow and run benchmarks for your environmen­t e.g. CIS Benchmarks for Docker, Kubernetes and Linux.

4. Penetratio­n tests: Run Penetratio­n tests on your clusters

5. Right access to right resource: Work with least privilege rules and provide only enough access which is required.

6. Runtime protection: Ensure that your workloads are monitored and protected against unexpected changes, anomalous behaviour, and automated threat detection and blocking.

To Summarize, securing your cloud infrastruc­ture and applicatio­ns is part of the journey to the cloud and it should be considered as part of your cloud native journey with containers and Kubernetes, serverless. Developmen­t team, DevOps teams and security teams need a unified view to bridge the gap between the teams and to handle security issues effectivel­y and quickly.

 ??  ??
 ??  ?? BHUVAN BHATT, R&D Head, Aqua India
BHUVAN BHATT, R&D Head, Aqua India
 ??  ??

Newspapers in English

Newspapers from India