Close
  • Home
  • Applications
      • Appointment Scheduling Software
      • Asset Management
      • CEM
      • Cognitive
      • Compliance
      • Data Center
      • E-Invoicing/E-Billing
      • Enterprise Communication
      • ERP
      • Facility Management
      • Franchise Management
      • GDPR
      • Information Security
      • ITSM
      • Knowledge Management
      • Managed IT Services
      • MarTech
      • Mobile Application Development
      • Payment and Card
      • Risk Management
      • RPA
      • Software Testing
  • Verticals
      • Automotive
      • Contact Center
      • Field Service
      • FinTech
      • Legal Tech
      • PropTech
  • Technologies
      • Agile
      • Artificial Intelligence
      • Augmented & Virtual Reality
      • Big Data
      • Chatbot
      • Cloud
      • Data Analytics
      • DevOps
      • Digital Transformation
      • Enterprise Architecture
      • IoT
      • Machine Learning
      • Remote Work Tech
      • Robotics
      • Smart City
      • Storage
  • Eco System
      • Atlassian
      • HPE
      • HubSpot
      • IBM
      • Microsoft
      • Oracle
      • Salesforce
      • SAP
  • Vendors
  • News
  • Newsletter
  • conferences
  • Specials

  • Menu
      • Agile
      • Cloud
      • Cognitive
      • GDPR
      • HPE
      • MarTech
      • Microsoft
  • Agile
  • Cloud
  • Cognitive
  • HPE
  • Machine Learning
  • MarTech
  • Microsoft
  • GDPR
Specials
  • Specials

  • Agile
  • Cloud
  • Cognitive
  • GDPR
  • HPE
  • MarTech
  • Microsoft
×
#

CIO Applications Europe Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Applications Europe

Subscribe

loading
  • Home
Editor's Pick(1 - 4 of 8)
left
How Cloud Systems Are Impacting Business Environments

Martin Stegner, CIO, NOVUM Hospitality

CIOs Shouldn't See OpenStack and Public Clouds as an Either/Or Proposition

Shelton Shugar, CIO, Barclaycard [NYSE:BCS-D]

Cloud and SaaS Security - The Need for a Comprehensive Approach

Richard A. Spires, CEO, Learning Tree International, Former CIO of US Department of Homeland Security and the IRS

Reimagining How Technology Can Fuel Growth

Gail Evans, CIO, Mercer Global

On Cloud Computing- Ups and Downs

Ian Cohen, CIO, Addison Lee

Leveraging Cloud for Enhanced Productivity

Aaron Gette, CIO, The Bay Club Company

Using Cloud Migration As Security Opportunity

CYRIL SEGRETAIN, INFORMATION SECURITY OFFICER EUROPE, UNIQLO

The Future of Financial Markets: Getting Ready for the Next Level of Cloud Usage

Michael Girg, Chief Cloud Officer, Deutsche Börse [FRA: DB1]

right

THANK YOU FOR SUBSCRIBING

Three Ways to Ensure Security of Cloud-Native Applications

By CIO Applications Europe| Monday, February 01, 2021
Tweet

Simplicity and integration excel when implementing a security solution. You can effectively minimize security and compliance threats by making security scanning an automatic by-product of your developers’ natural workflow.

Fremont, CA: While cloud-native applications are considered relatively stable, vulnerability possibilities are still present. Containers, orchestrators, and APIs included in an application’s surrounding infrastructure reflect new areas of attack. Apart from the cloud service itself, each of these layers has a range of user-defined settings to help users implement their security measures. This manual setup is riddled with user error and misconfiguration opportunities that expose the business to future attacks. Here are three ways to ensure the security of cloud-native applications:

Deploy Policies for What Is Acceptable and Assess Drift

top cloud based planning solution companies

Use automation to implement policies that support your risk appetite. Then constantly monitor drift that happens when security configurations of the cloud service, containers, or orchestrators are changed or when deployment resources themselves are modified. To identify this, permissible resources should be listed for each security setting, and each implementation checked for exceptions.

Identify and Manage Your Secrets

APIs often demand that secrets be passed to allow one piece of code to communicate to another piece of code. Passwords, SSH keys, tokens, and so on will contain these secrets. In managing secrets, common mistakes include placing them in the code itself, not rotating them, and not backing them up. In reality, simply storing secrets in a plain-text project configuration file or environmental variables is one of the most common recurrent errors. Fortunately, a secret detection scan will recognize secrets added to your code repository inadvertently or deliberately, allowing the developer to delete and invalidate the revealed secret before it can be used in an attack.

See Also: Top Cloud Consulting Companies

Scan All Applications for Vulnerabilities

Attackers rarely go for mission-critical applications directly. Instead, they search for a weak link, a back-office internal application, or a one-and-done campaign marketing app. Then, through your containers and orchestrators, they progress to reach the confidential data. This is why it’s necessary to test all of your software whenever it’s replaced.

Weekly Brief

loading
news
ON THE DECK

MarTech 2021

Top Vendors

Top Vendors

Previous Next

Read Also

The Importance of Agile Security in Digital transformation

The Importance of Agile Security in Digital transformation

Interesting Facts about Cloud

Interesting Facts about Cloud

How Big Data can help in Digital Transformation

How Big Data can help in Digital Transformation

How Credit Cards can Optimize Users' Finances

How Credit Cards can Optimize Users' Finances

How Artificial General Intelligence Revolutionizes Business?

How Artificial General Intelligence Revolutionizes Business?

Synamedia Launches Clarissa to Introduce New Clarity to Video Business Decisions

Synamedia Launches Clarissa to Introduce New Clarity to Video Business Decisions

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2021 CIOApplicationsEurope. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap |  Subscribe |  About Us

follow on linkedin follow on twitter follow on rss
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://www.cioapplicationseurope.com/news/three-ways-to-ensure-security-of-cloudnative-applications--nid-2292.html