January 9, 2020 By Piotr Godowski 2 min read

More than 85 percent of companies already operate in multicloud environments and by 2021, 98 percent plan to use multiple hybrid clouds, according to the IBM Institute for Business Value (IBV). After cloud adoption, the application modernization trend follows, with an integral part of it being microservices architecture — decomposing monoliths into single-job oriented, containerized services exchanging data over APIs. As most companies are using more than just one cloud for their applications, what does this mean from a cybersecurity point of view?

Here are three aspects that your IT and security teams need to be aware of when it comes to the security aspects of containerized applications.

1. Application Vulnerabilities

The modern application today uses tons of open-source libraries. They are great in general, as they provide a solid baseline to build on top of, but they require vetting applications against publicly known common vulnerabilities and exposures (CVEs) raised against those libraries.

Fortunately, there are tools that scan Docker images of the applications to detect issues. Some public clouds provide integrated vulnerability scanning services, which can not only detect issues in the container image and prevent them from being deployed but also can detect containers’ configuration drift during their lifetime. It’s worth checking to ensure your cloud has this service turned on.

2. Varied Configurations

Each cloud might have different configurations for storage, networking, load balancing and other aspects. Following the configuration as the code design pattern helps significantly, but don’t stop there. If possible, apply policy-driven configurations, ideally making sure that your Kubernetes clusters are set up in exactly the same way, regardless of which cloud you are using.

3. Authentication Differences

Most applications rely on external authentication providers, and there are some differences between identity and access management (IAM) solutions available on public clouds. While there is an ongoing effort to make sure they are somewhat standardized, organizations should ensure they are using the commonly adopted authentication patterns to avoid cases where some instances of your app are better secured than others, running on different clouds.

Centralize Your Cloud Security and Management

As the old IT saying goes, “You cannot control what you cannot see.” It is critical that you either consistently monitor your multicloud environment or invest in multicloud management tools that can help in setting up policy-based compliance profiles. Modern multicloud management can bring visibility to multicloud assets and apply cloud configuration policies to ensure consistent settings are used across environments. Solutions should also integrate application vulnerability scanning technologies to prevent vulnerable applications from being deployed.

Finally, organizations that are moving to multiple hybrid clouds can boost their cloud security posture with a centralized method for tracking all the critical aspects of multicloud environments, combining multiple data feeds and cross-correlating them against known security issues to protect the business.

More from Cloud Security

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Cloud threat report: Possible trend in cloud credential “oversaturation”

3 min read - For years now, the dark web has built and maintained its own evolving economy, supported by the acquisition and sales of stolen data, user login credentials and business IP. But much like any market today, the dark web economy is subject to supply and demand.A recent X-Force Cloud Threat Landscape Report has shed light on this fact, revealing a new trend in the average prices for stolen cloud access credentials. Since 2022, there has been a steady decrease in market…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today