January 9, 2020 By Piotr Godowski 2 min read

More than 85 percent of companies already operate in multicloud environments and by 2021, 98 percent plan to use multiple hybrid clouds, according to the IBM Institute for Business Value (IBV). After cloud adoption, the application modernization trend follows, with an integral part of it being microservices architecture — decomposing monoliths into single-job oriented, containerized services exchanging data over APIs. As most companies are using more than just one cloud for their applications, what does this mean from a cybersecurity point of view?

Here are three aspects that your IT and security teams need to be aware of when it comes to the security aspects of containerized applications.

1. Application Vulnerabilities

The modern application today uses tons of open-source libraries. They are great in general, as they provide a solid baseline to build on top of, but they require vetting applications against publicly known common vulnerabilities and exposures (CVEs) raised against those libraries.

Fortunately, there are tools that scan Docker images of the applications to detect issues. Some public clouds provide integrated vulnerability scanning services, which can not only detect issues in the container image and prevent them from being deployed but also can detect containers’ configuration drift during their lifetime. It’s worth checking to ensure your cloud has this service turned on.

2. Varied Configurations

Each cloud might have different configurations for storage, networking, load balancing and other aspects. Following the configuration as the code design pattern helps significantly, but don’t stop there. If possible, apply policy-driven configurations, ideally making sure that your Kubernetes clusters are set up in exactly the same way, regardless of which cloud you are using.

3. Authentication Differences

Most applications rely on external authentication providers, and there are some differences between identity and access management (IAM) solutions available on public clouds. While there is an ongoing effort to make sure they are somewhat standardized, organizations should ensure they are using the commonly adopted authentication patterns to avoid cases where some instances of your app are better secured than others, running on different clouds.

Centralize Your Cloud Security and Management

As the old IT saying goes, “You cannot control what you cannot see.” It is critical that you either consistently monitor your multicloud environment or invest in multicloud management tools that can help in setting up policy-based compliance profiles. Modern multicloud management can bring visibility to multicloud assets and apply cloud configuration policies to ensure consistent settings are used across environments. Solutions should also integrate application vulnerability scanning technologies to prevent vulnerable applications from being deployed.

Finally, organizations that are moving to multiple hybrid clouds can boost their cloud security posture with a centralized method for tracking all the critical aspects of multicloud environments, combining multiple data feeds and cross-correlating them against known security issues to protect the business.

More from Cloud Security

Cloud security uncertainty: Do you know where your data is?

3 min read - How well are security leaders sleeping at night? According to a recent Gigamon report, it appears that many cyber professionals are restless and worried.In the report, 50% of IT and security leaders surveyed lack confidence in knowing where their most sensitive data is stored and how it’s secured. Meanwhile, another 56% of respondents say undiscovered blind spots being exploited is the leading concern making them restless.The report reveals the ongoing need for improved cloud and hybrid cloud security. Solutions to…

Cloud security evolution: Years of progress and challenges

7 min read - Over a decade since its advent, cloud computing continues to enable organizational agility through scalability, efficiency and resilience. As clients shift from early experiments to strategic workloads, persistent security gaps demand urgent attention even as providers expand infrastructure safeguards.The prevalence of cloud-native services has grown exponentially over the past decade, with cloud providers consistently introducing a multitude of new services at an impressive pace. Now, the contemporary cloud environment is not only larger but also more diverse. Unfortunately, that size…

The compelling need for cloud-native data protection

4 min read - Cloud environments were frequent targets for cyber attackers in 2023. Eighty-two percent of breaches that involved data stored in the cloud were in public, private or multi-cloud environments. Attackers gained the most access to multi-cloud environments, with 39% of breaches spanning multi-cloud environments because of the more complicated security issues. The cost of these cloud breaches totaled $4.75 million, higher than the average cost of $4.45 million for all data breaches.The reason for this high cost is not only the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today