SlideShare a Scribd company logo
Cloud-Native Security
New approach for a new reality
Tsvi Korren, Aqua
2
What do we mean by Cloud-Native?
Made to run
in the cloud
(public, private, hybrid)
App payload is
decoupled from
the infrastructure
Orchestrated for
updateability, scaling
and resilience
App is based on
loosely-coupled
microservices
3
The rules still need to apply
l Risk mitigation, vulnerabilities, integrity
l Deployment authorization, visibility, inventory
l Operational administration and change control
l Secrets management and secure configuration
l Network segmentation of microservices
l SOC and incident response
4
The Challenge
Cloud-Native deployments natively lack support
for effective and demonstrable security
required by business-critical applications
Organization:
DevOps ó Security
Process:
Where to secure
Technology:
How to secure
5
Urgent need to bridge the gap
CI/CD
Images
Kubernetes
Cloud
Compliance
Access Controls
Intrusion Prevention
Forensics
6
Changes in process
Config
software
Assess
Risk
Coding
Static
Analysis
Compile
package
Deploy
Get Base
Image
Using
Servers
Using
Containers
Deploy Fix Risks
Build
Image
Fix Risks
Scan
Server
Get Base
Image
Coding
Static
Analysis
Deploy
Build
Image
Fix Risks
Coding
Static
Analysis
Provision
Server
7
Diminishing ability to execute controls
Container
Orchestration
Host
Network
Data Center
Serverless
Functions
App Payload
Container
Orchestration
Host
Network
Data Center
Containers
as service
App Payload
Container
Orchestration
Host
Network
Data Center
Managed
Containers
App Payload
Container
Orchestration
Host
Network
Data Center
Cloud VMs
App Payload
Container
Orchestration
Host
Network
Data Center
On Premises
App Payload
Packaging
Development
Packaging
Development
Packaging
Development
Packaging
Development
Packaging
Development
8
Our Goal
Security as a
shared
responsibility
Automate security
as a natural part of
DevOps processes
Protect workloads
with focus on
prevention
Make containers the most secure, predictable
and controlled platform for running critical
applications
9
We have an opportunity to be more precise
Accounting for every vulnerability
and possible threat is untenable
Know what to keep safe,
and how to defend it
10
We have an opportunity to simplify
Too many manual security options
and rules become ineffective
Protect immutable workloads, with
rules generated over the pipeline
Stages of Cloud Native security maturity
Image acceptance
Run with least privileges
Network controls
Container immutability
Application context authorization
Immediate incident response
Cluster Hygiene
RBAC
Minimal OS
Compliance Checks
12
The Orchestration System
Easily
misconfigured
Handles
Secrets
Runs
Everywhere
Operates
as root
13
l Restrict network access to the Kubernetes API addresses and ports
l Use separate authentication for each authorized user
l Patch and upgrade Kubernetes as needed
l Control access from production Kubernetes to public registries
Kubernetes security checklist
14
Kubernetes assessment
Stages of Cloud Native security maturity
Image acceptance
Run with least privileges
Network controls
Container immutability
Application context authorization
Immediate incident response
Image Hygiene
Vulnerability scanning
Compliant configuration
Approved base images
Cluster Hygiene
RBAC
Minimal OS
Compliance Checks
16
l Use the smallest image possible for your project
l Avoid storing keys and other sensitive data in the image
l Add the minimal number of packages required for your application
l Use dedicated users, non-standard ports
l Remove utilities at the end of the build (useradd, chown, curl)
l Scan the finished product
Image security checklist
17
Top base container images
5.28 MB
95.93 MB
84.79 MB
192.44 MB
18
Scanning images
{
"name": "CVE-2016-7444",
"description": "nThe gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and
3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote
attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left
by gnutls_malloc.nA flaw was found in the way GnuTLS validated certificates using OCSP responses. This
could falsely report a certificate as valid under certain circumstances.",
"nvd_score": 5,
"nvd_score_version": "CVSS v2",
"nvd_vectors": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"nvd_severity": "medium",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7444",
"vendor_score": 4.3,
"vendor_score_version": "CVSS v2",
"vendor_vectors": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"vendor_severity": "low",
"vendor_url": "https://access.redhat.com/security/cve/CVE-2016-7444",
"publish_date": "2016-09-27",
"modification_date": "2018-01-04",
"fix_version": "3.3.26-9.el7",
"solution": "Upgrade package gnutls to version 3.3.26-9.el7 or above."
}
Backports and fix
advice
NVD data and score
Maintainer data
and score
Impact statement
19
Beyond vulnerabilities: image content
Stages of Cloud Native security maturity
Containment
Image acceptance
Run with least privileges
Network controls
Prevention
Container immutability
Application context authorization
Immediate incident response
Image Hygiene
Vulnerability scanning
Compliant configuration
Approved base images
Cluster Hygiene
RBAC
Minimal OS
Compliance Checks
21
Specific controls
Applying Runtime controls
Image
authorization
Runtime
Policies
Container
profile
•Non-Compliant
•Unregistered
•Drift Prevention
•Process Blacklists
•Full whitelisting
General controls
Secrets, Networking, Forensics
NodeandKuberentesSecurity
22
Image acceptance
23
Least privilege at runtime
24
Incident Response with servers
• Suspicious activity? • Shut down service?
• Requires investigation and triage
• Could be an administrative action
• Limited ability for narrow response
• Risk of service disruption
25
Incident Response with containers
• Unauthorized action • Block specific action
• Container behavior model is known
• Administrative action is not allowed
• Surgical preventive controls
• No disruption of service
26
l Security – Establish the policies that govern:
„ Image acceptance
„ Runtime behavior
l DevOps – Use security advice from scanning in image builds
l SOC – Receive events and respond to incidents
Roles and responsibilities
27
Same standards, escalating enforcement
Sandbox Development Test/Stage Production
Voluntary Mandatory Detection Enforcement
Scanning as a
service
Scanning in the
pipeline with
policies
Application
security modeling
Protecting the
application
28
Continuous discovery, image assurance
Enforce immutability with drift prevention
Limit user and executable use
Secured secrets distribution into container
Workload firewall across all interfaces
Secure workload with application context
Rogue deployment
Malicious code injection
Administration actions
Compromised credentials
Network connections
Unknown vectors (Zero Day)
Top risks addressed
29
Where to start?
n Scans Kubernetes nodes
against the CIS
benchmark checks
n github.com/aquasecurity/
kube-bench
n Scan Docker build for
known vulnerabilities
n Plug-in for Jenkins
n github.com/aquasecurity
/microscanner
CIS benchmark for K8SDocker image scanner K8S penetration-testing
n Tests K8s clusters against
known attack vectors,
both remote and internal
n github.com/aquasecurity/
kube-hunter
www.aquasec.com

More Related Content

PPTX
Migration into a Cloud
PPTX
Moving to the cloud: cloud strategies and roadmaps
PPTX
What is SSL/TLS, 1-way and 2-way SSL?
PPTX
Cloud computing and Cloud security fundamentals
PPTX
GitOps w/argocd
PDF
Kubernetes GitOps featuring GitHub, Kustomize and ArgoCD
PDF
Multi-Cloud Strategy for Unrestricted Possibilities
PDF
Red Hat OpenShift Container Platform Overview
Migration into a Cloud
Moving to the cloud: cloud strategies and roadmaps
What is SSL/TLS, 1-way and 2-way SSL?
Cloud computing and Cloud security fundamentals
GitOps w/argocd
Kubernetes GitOps featuring GitHub, Kustomize and ArgoCD
Multi-Cloud Strategy for Unrestricted Possibilities
Red Hat OpenShift Container Platform Overview

What's hot (20)

PPTX
Cloud Computing & Cloud Architecture
PDF
Continuous Integration and Continuous Delivery on Azure
PPTX
Docker In Cloud
PPTX
Intro to Helm for Kubernetes
PPTX
cloud-migrations.pptx
PPTX
Multi cloud security architecture
PDF
Microsoft Azure Cloud Services
PDF
Anthos Application Modernization Platform
PDF
GitOps is the best modern practice for CD with Kubernetes
PDF
Getting started with GCP ( Google Cloud Platform)
PDF
Introduction to DevOps Tools | DevOps Training | DevOps Tutorial for Beginner...
PPTX
Azure Application Modernization
PDF
ArgoCD and Tekton: Match made in Kubernetes heaven | DevNation Tech Talk
PPTX
Meetup 23 - 03 - Application Delivery on K8S with GitOps
PDF
Private cloud network architecture (2018)
PDF
introducción a Docker
PDF
Getting more into GCP.pdf
PPTX
The Ideal Approach to Application Modernization; Which Way to the Cloud?
PPTX
Kubernetes CI/CD with Helm
Cloud Computing & Cloud Architecture
Continuous Integration and Continuous Delivery on Azure
Docker In Cloud
Intro to Helm for Kubernetes
cloud-migrations.pptx
Multi cloud security architecture
Microsoft Azure Cloud Services
Anthos Application Modernization Platform
GitOps is the best modern practice for CD with Kubernetes
Getting started with GCP ( Google Cloud Platform)
Introduction to DevOps Tools | DevOps Training | DevOps Tutorial for Beginner...
Azure Application Modernization
ArgoCD and Tekton: Match made in Kubernetes heaven | DevNation Tech Talk
Meetup 23 - 03 - Application Delivery on K8S with GitOps
Private cloud network architecture (2018)
introducción a Docker
Getting more into GCP.pdf
The Ideal Approach to Application Modernization; Which Way to the Cloud?
Kubernetes CI/CD with Helm
Ad

Similar to Cloud Native Security: New Approach for a New Reality (20)

PPTX
Security Practices in Kubernetes
PDF
Embacing service-level-objectives of your microservices in your Cl/CD
PPTX
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
PPTX
In-kernel Analytics and Tracing with eBPF for OpenStack Clouds
PDF
Best Practices To Secure Kubernetes Cluster
PPTX
Regulated Reactive - Security Considerations for Building Reactive Systems in...
PPTX
Security for cloud native workloads
PPTX
Hybrid - Seguridad en Contenedores v3.pptx
PDF
Azure 101: Shared responsibility in the Azure Cloud
PDF
IANS information security forum 2019 summary
PDF
Introduction to DevSecOps
PDF
AWS live hack: Docker + Snyk Container on AWS
PDF
Enforcing Immutability and Least Privilege to Secure Containerized Applicatio...
PDF
Cloud security introduction
PPTX
nsx overview with use cases 1.0
PDF
AWS Community Day - Vitaliy Shtym - Pragmatic Container Security
PDF
DevSecCon Lightning 2021- Container defaults are a hackers best friend
PDF
How to Accelerate Your Application Delivery Process on Top of Kubernetes Usin...
PPTX
Automating Network Firewall Rule Creation using Powershell and CI/CD
PPTX
Cloud Security vs Security in the Cloud
Security Practices in Kubernetes
Embacing service-level-objectives of your microservices in your Cl/CD
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
In-kernel Analytics and Tracing with eBPF for OpenStack Clouds
Best Practices To Secure Kubernetes Cluster
Regulated Reactive - Security Considerations for Building Reactive Systems in...
Security for cloud native workloads
Hybrid - Seguridad en Contenedores v3.pptx
Azure 101: Shared responsibility in the Azure Cloud
IANS information security forum 2019 summary
Introduction to DevSecOps
AWS live hack: Docker + Snyk Container on AWS
Enforcing Immutability and Least Privilege to Secure Containerized Applicatio...
Cloud security introduction
nsx overview with use cases 1.0
AWS Community Day - Vitaliy Shtym - Pragmatic Container Security
DevSecCon Lightning 2021- Container defaults are a hackers best friend
How to Accelerate Your Application Delivery Process on Top of Kubernetes Usin...
Automating Network Firewall Rule Creation using Powershell and CI/CD
Cloud Security vs Security in the Cloud
Ad

More from Carlos Andrés García (8)

PPTX
Automate and Enhance Application Security Analysis
PDF
Securing a Cloud Migration
PDF
Cloud-Native Streaming Platform: Running Apache Kafka on PKS (Pivotal Contain...
PPTX
PostgreSQL-as-a-Service with Crunchy PostgreSQL for PKS
PPTX
High performance Spark distribution on PKS by SnappyData
PPTX
PKS - Solving Complexity for Modern Data Workloads
PPTX
A Planet-Scale Database for Low Latency Transactional Apps by Yugabyte
PPTX
Orchestrating Stateful Applications with PKS and Portworx
Automate and Enhance Application Security Analysis
Securing a Cloud Migration
Cloud-Native Streaming Platform: Running Apache Kafka on PKS (Pivotal Contain...
PostgreSQL-as-a-Service with Crunchy PostgreSQL for PKS
High performance Spark distribution on PKS by SnappyData
PKS - Solving Complexity for Modern Data Workloads
A Planet-Scale Database for Low Latency Transactional Apps by Yugabyte
Orchestrating Stateful Applications with PKS and Portworx

Recently uploaded (20)

PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Materi_Pemrograman_Komputer-Looping.pptx
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
DOCX
The Five Best AI Cover Tools in 2025.docx
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
System and Network Administration Chapter 2
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPT
JAVA ppt tutorial basics to learn java programming
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Materi_Pemrograman_Komputer-Looping.pptx
Odoo POS Development Services by CandidRoot Solutions
PTS Company Brochure 2025 (1).pdf.......
Design an Analysis of Algorithms I-SECS-1021-03
VVF-Customer-Presentation2025-Ver1.9.pptx
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Internet Downloader Manager (IDM) Crack 6.42 Build 41
The Five Best AI Cover Tools in 2025.docx
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Understanding Forklifts - TECH EHS Solution
Upgrade and Innovation Strategies for SAP ERP Customers
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
System and Network Administration Chapter 2
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
JAVA ppt tutorial basics to learn java programming

Cloud Native Security: New Approach for a New Reality

  • 1. Cloud-Native Security New approach for a new reality Tsvi Korren, Aqua
  • 2. 2 What do we mean by Cloud-Native? Made to run in the cloud (public, private, hybrid) App payload is decoupled from the infrastructure Orchestrated for updateability, scaling and resilience App is based on loosely-coupled microservices
  • 3. 3 The rules still need to apply l Risk mitigation, vulnerabilities, integrity l Deployment authorization, visibility, inventory l Operational administration and change control l Secrets management and secure configuration l Network segmentation of microservices l SOC and incident response
  • 4. 4 The Challenge Cloud-Native deployments natively lack support for effective and demonstrable security required by business-critical applications Organization: DevOps ó Security Process: Where to secure Technology: How to secure
  • 5. 5 Urgent need to bridge the gap CI/CD Images Kubernetes Cloud Compliance Access Controls Intrusion Prevention Forensics
  • 6. 6 Changes in process Config software Assess Risk Coding Static Analysis Compile package Deploy Get Base Image Using Servers Using Containers Deploy Fix Risks Build Image Fix Risks Scan Server Get Base Image Coding Static Analysis Deploy Build Image Fix Risks Coding Static Analysis Provision Server
  • 7. 7 Diminishing ability to execute controls Container Orchestration Host Network Data Center Serverless Functions App Payload Container Orchestration Host Network Data Center Containers as service App Payload Container Orchestration Host Network Data Center Managed Containers App Payload Container Orchestration Host Network Data Center Cloud VMs App Payload Container Orchestration Host Network Data Center On Premises App Payload Packaging Development Packaging Development Packaging Development Packaging Development Packaging Development
  • 8. 8 Our Goal Security as a shared responsibility Automate security as a natural part of DevOps processes Protect workloads with focus on prevention Make containers the most secure, predictable and controlled platform for running critical applications
  • 9. 9 We have an opportunity to be more precise Accounting for every vulnerability and possible threat is untenable Know what to keep safe, and how to defend it
  • 10. 10 We have an opportunity to simplify Too many manual security options and rules become ineffective Protect immutable workloads, with rules generated over the pipeline
  • 11. Stages of Cloud Native security maturity Image acceptance Run with least privileges Network controls Container immutability Application context authorization Immediate incident response Cluster Hygiene RBAC Minimal OS Compliance Checks
  • 13. 13 l Restrict network access to the Kubernetes API addresses and ports l Use separate authentication for each authorized user l Patch and upgrade Kubernetes as needed l Control access from production Kubernetes to public registries Kubernetes security checklist
  • 15. Stages of Cloud Native security maturity Image acceptance Run with least privileges Network controls Container immutability Application context authorization Immediate incident response Image Hygiene Vulnerability scanning Compliant configuration Approved base images Cluster Hygiene RBAC Minimal OS Compliance Checks
  • 16. 16 l Use the smallest image possible for your project l Avoid storing keys and other sensitive data in the image l Add the minimal number of packages required for your application l Use dedicated users, non-standard ports l Remove utilities at the end of the build (useradd, chown, curl) l Scan the finished product Image security checklist
  • 17. 17 Top base container images 5.28 MB 95.93 MB 84.79 MB 192.44 MB
  • 18. 18 Scanning images { "name": "CVE-2016-7444", "description": "nThe gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.nA flaw was found in the way GnuTLS validated certificates using OCSP responses. This could falsely report a certificate as valid under certain circumstances.", "nvd_score": 5, "nvd_score_version": "CVSS v2", "nvd_vectors": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "nvd_severity": "medium", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7444", "vendor_score": 4.3, "vendor_score_version": "CVSS v2", "vendor_vectors": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "vendor_severity": "low", "vendor_url": "https://access.redhat.com/security/cve/CVE-2016-7444", "publish_date": "2016-09-27", "modification_date": "2018-01-04", "fix_version": "3.3.26-9.el7", "solution": "Upgrade package gnutls to version 3.3.26-9.el7 or above." } Backports and fix advice NVD data and score Maintainer data and score Impact statement
  • 20. Stages of Cloud Native security maturity Containment Image acceptance Run with least privileges Network controls Prevention Container immutability Application context authorization Immediate incident response Image Hygiene Vulnerability scanning Compliant configuration Approved base images Cluster Hygiene RBAC Minimal OS Compliance Checks
  • 21. 21 Specific controls Applying Runtime controls Image authorization Runtime Policies Container profile •Non-Compliant •Unregistered •Drift Prevention •Process Blacklists •Full whitelisting General controls Secrets, Networking, Forensics NodeandKuberentesSecurity
  • 24. 24 Incident Response with servers • Suspicious activity? • Shut down service? • Requires investigation and triage • Could be an administrative action • Limited ability for narrow response • Risk of service disruption
  • 25. 25 Incident Response with containers • Unauthorized action • Block specific action • Container behavior model is known • Administrative action is not allowed • Surgical preventive controls • No disruption of service
  • 26. 26 l Security – Establish the policies that govern: „ Image acceptance „ Runtime behavior l DevOps – Use security advice from scanning in image builds l SOC – Receive events and respond to incidents Roles and responsibilities
  • 27. 27 Same standards, escalating enforcement Sandbox Development Test/Stage Production Voluntary Mandatory Detection Enforcement Scanning as a service Scanning in the pipeline with policies Application security modeling Protecting the application
  • 28. 28 Continuous discovery, image assurance Enforce immutability with drift prevention Limit user and executable use Secured secrets distribution into container Workload firewall across all interfaces Secure workload with application context Rogue deployment Malicious code injection Administration actions Compromised credentials Network connections Unknown vectors (Zero Day) Top risks addressed
  • 29. 29 Where to start? n Scans Kubernetes nodes against the CIS benchmark checks n github.com/aquasecurity/ kube-bench n Scan Docker build for known vulnerabilities n Plug-in for Jenkins n github.com/aquasecurity /microscanner CIS benchmark for K8SDocker image scanner K8S penetration-testing n Tests K8s clusters against known attack vectors, both remote and internal n github.com/aquasecurity/ kube-hunter