Cloud-native has evolved from a marketing term into a highly desirable and useful architecture choice, yielding significant benefits for designing, building, and deploying applications. But security is too often overlooked.
Advantages of cloud-native applications include increased flexibility and scalability, ease of management, faster time to market, and lower cost requirements. Because of this, it's easy to see why shifting software development efforts to the cloud has become the default for many organizations.
However, amid all the benefits that cloud-native applications bring to the table comes an intricate and layered attack surface that is still widely misunderstood and under-secured.
Containers, APIs, infrastructure as code (IaC), microservices, and other cloud-based components all comprise a large portion of these cloud-hosted apps. A 2020 report from the Cloud Native Computing Foundation noted that 92% of surveyed organizations used containers in production, up from 84% the previous year.
Given the complexities of such an advanced architecture, traditional testing methodologies simply aren't enough to address security holistically for cloud-native applications.
While adopting new technologies like cloud-native is essential, organizations must ensure application security is brought along every step of the way. Here's where to start.
Cloud is native, but security isn’t: Shift your app sec testing approach
Share on facebook
Share on twitter
Share on linkedin
Erez Yalon
Erez Yalon heads the security research group at Checkmarx. With vast defender and attacker experience and as an independent security researcher, he brings invaluable knowledge and skills to the table. Erez is responsible for maintaining Checkmarx’s top notch vulnerability detection technology where his previous development experience with a variety of coding languages comes into play.
View All Posts
Latest Blog Posts
CTparental Vulnerabilities Enabled Filter Bypassing
August 19, 2021
Checkmarx – Making Waves Once Again
August 18, 2021
Follow Us

How API Use Cases Have Evolved, and What It Means for API Security
APIs are like telephones: they have been around for quite a while, yet they have changed tremendously in recent years.
August 25, 2021
Checkmarx Launches New Global Partner Program
Empowers partners and distributors to grow and retain customer bases while meeting accelerating demand for AST solutions NEW YORK &
August 24, 2021

CTparental Vulnerabilities Enabled Filter Bypassing
For those who don’t know me, I am a mother to two brilliant children who are better at the game
August 19, 2021

Checkmarx – Making Waves Once Again
In organizations that encourage the usage of modern application development techniques to expedite the development, delivery, and deployment of custom
August 18, 2021
Checkmarx Named a Strong Performer in Software Composition Analysis by Leading Analyst Firm
NEW YORK & RAMAT GAN, ISRAEL – August 18, 2021 – Checkmarx, the global leader in developer-centric application security testing (AST) solutions, today announced
August 18, 2021

Why Developers Worldwide Benefit from Secure Coding Education
Global Developers think secure coding education can save time and money while adding personal and organizational value. The impact of
August 16, 2021

Why Centralized Risk Management and Governance Are Key to Modernizing Legacy Applications
A Mandate from Federal Government Today, security is an absolute requirement. The Federal Government knows that security is a critical
August 11, 2021

The Magic of GitLab’s Templates: What’s New with Checkmarx GitLab Integration
Last year at GitLab Commit, I presented our integration with GitLab to initiate Checkmarx security scans within your GitLab CI/CD
August 9, 2021
Checkmarx Acquires Software Supply Chain Security Provider, Dustico
Acquisition brings behavioral source code analysis to Checkmarx customers to defend against open source software supply chain attacks RAMAT GAN,
August 5, 2021

KICS is Exceeding All Expectations
KICS (Keeping Infrastructure as Code Secure) has had an incredibly successful launch with over 273k downloads as of date! As
August 3, 2021

What’s Lurking Within: Stopping Malicious Actors in Software Supply Chains
What’s Lurking Within? Malicious Code. Supply chain attacks occur when cyberthreat actors insert malicious code into trusted software, creating a
August 3, 2021

Business Benefits of Buying Your Application Security Solution on AWS Marketplace
The rise of cloud technology has revolutionized the way we think about software and how organizations buy it. Long procurement
July 29, 2021

Chained RaspAP Vulnerabilities Grant Root Level Access
According to its official documentation, “RaspAP” is a wireless router software for many popular Debian-based devices, including the Raspberry Pi. It
July 29, 2021

Not All AppSec Scanning Is Created Equal
You no doubt know the phrase, “if you don’t have anything nice to say, don’t say anything at all.” A
July 27, 2021

Developing Digital Citizen Services: Our Duty to Keep Digital Government Secure
Cybersecurity is top of mind right now as President Biden’s Executive Order sets a new, more urgent tone around the
July 20, 2021
