The State of Cloud Workload Security
January 10, 2019

Ranny Nachmias
Alcide

As organizations of all sizes are embracing hybrid and multi-cloud infrastructures, they are experiencing the many benefits of a more agile, distributed and high-speed environment where new applications and services can be built and delivered in days and weeks, rather than months and years. But as the adoption of these next generation architectures continues to grow, so do the complexities of securing the cloud workloads running on them.

The results of a recent survey of 350 IT professionals conducted by Alcide and IT Pro indicate that, in 2018, the volume of workloads running in the cloud is growing rapidly, but the workflows and tools to secure these cloud workloads are still highly fragmented and dependent on manual configuration. At a time when security and privacy requirements are more stringent than ever, manually configured workflows are a constraint on business velocity. It is clear there is still an unmet need for end-to-end security solutions that can support frictionless DevOps processes and security professionals in securing cloud workloads in a way that accelerates business outcomes and enhances the organization’s competitive edge.

Hybrid, Multi-Cloud Environments with Distributed Workloads are the New Norm

While cloud computing has been around for many years now, the diversification of cloud infrastructure — to hybrid and multi-cloud environments — is becoming more and more common. The survey results confirm that hybrid cloud is now the de facto standard for modern infrastructure; a mix of on-premise and cloud environments. Within those environments, workloads are also distributed across cloud computes: virtual machines (VMs) are the most common environment (83%), with containers (33%), serverless (28%), and service mesh (21%) gaining traction. Though not technically considered types of compute, we still put serverless and service-mesh under the same roof as containers and VMs when we talk about usage.


Serverless computing in particular is growing in popularity with 28% of respondents deploying serverless compute within their organizations.


The growing popularity of serverless is attributed to three top motivators including reducing operational costs, improving resource utilization and making the management of apps in a hybrid environment easier.


Despite the many benefits of agile, distributed environments, traditional perimeter-based approaches cannot meet the security requirements of these next-generation apps, and are creating new paradigms based on a shift-left approach that brings security to the app layer early on.

Serverless Security Remains a Question

While the use of containers and serverless continues to expand with the increasingly popular new approaches to software development such as microservices, these new forms of compute require security approaches that span the diverse cloud infrastructure, workloads, and services.

Although added infrastructure complexity is requiring new security methods, there is not yet a widely adopted technique to address these types of environments. Specifically, the report revealed tech. teams are not yet fully confident in the security of their serverless instances. According to the survey, 44% of IT specialists consider their enterprise’s serverless computes to be only "somewhat secure." Additionally, with only 7% believing that their enterprise has a high level of serverless expertise, there is still a learning curve for IT and security teams to know how and when to apply effective security controls in serverless apps.


Overall Complexity of Cloud Security Continues to Grow with Even More Point Solutions

The survey results show that serverless security is not the only area that could be improved in 2019. More broadly, cloud workload security remains extremely fragmented with the number of cloud security tools continuing to expand. Across all company sizes and job types, 75% of the respondents expect their cloud security stack to increase during the next 12 months — either "significantly" (20%) or "somewhat".


Additionally, cloud workload security configuration has yet to benefit from automation, with nearly three-quarters of security pros reporting that they are still configuring application security policies manually.

Most configurations are highly decentralized: 44% of medium-large enterprises and 74% of very large enterprises have 3 or more people involved in the configuration of security policies for any given app. These time-consuming and error-prone processes often increase vulnerability and business velocity.


Conclusion

Our survey results clearly indicate that cloud security has not yet benefited from the great strides that have been made in automating the security and management of resources and the continuous secured deployment of apps. Innovative, cloud-native, cross-environment security solutions are required to provide effective management and real-time responses to a wide range of attack scenarios. Organizations need unified security controls that span the entire cloud infrastructure, workloads, and services. Additionally, cloud workload security has some catching up to do as manual procedures will no longer cut it in these increasingly distributed environments - automation is critical to consistently implementing corporate security and compliance policies within a holistic and agile framework.

Ranny Nachmias is CEO and Co-Founder of Alcide
Share this

Industry News

September 17, 2020

env0, a developer of Infrastructure-as-Code (IaC) management software, announced the availability of its new open source solution for Terraform users, Terratag.

September 17, 2020

Push Technology announced a partnership with Innova Solutions, an ACS Solutions company, specializing in global information technology services.

September 17, 2020

Alcide achieved the AWS Outposts Ready designation, part of the Amazon Web Services (AWS) Service Ready Program.

September 16, 2020

Portshift announced serverless container security support for AWS Fargate.

September 16, 2020

Sonatype and NeuVector announced a new integration that provides a comprehensive view of all Kubernetes and Container open source risk in one place.

September 16, 2020

Pure Storage entered into a definitive agreement to acquire Portworx, a Kubernetes data services platform enterprises trust to run mission-critical applications in containers in production.

September 15, 2020

OutSystems announced a series of new tools and capabilities that will empower organizations of all sizes to build applications quickly, build them right, and build them for the future.

September 15, 2020

VMware unveiled new offerings to help customers further accelerate their app and infrastructure modernization initiatives. VMware vSphere 7 Update 1, VMware vSAN 7 Update 1 and VMware Cloud Foundation 4.1 product releases streamline customer adoption of Kubernetes and support stateful applications with new developer-ready capabilities and enhance scalability and operations with new features.

September 15, 2020

Oracle announced the general availability of Java 15 (Oracle JDK 15).

September 14, 2020

Actifio announced a global alliance with Persistent Systems, a global solutions company with deep technology expertise, to help enterprises with data stack modernization and acceleration of digital transformation initiatives.

September 14, 2020

Perforce Software announced the release of the Helix TeamHub Command-Line Client (hth-cli).

September 14, 2020

StackRox secured an additional $26.5 million in funding.

September 10, 2020

JourneyApps announced the official launch of its OXIDE Integrated Development Environment (IDE) which ushers in a new paradigm of building, deploying and managing secure and powerful business applications.

September 10, 2020

Solo.io announced the WebAssembly OCI Image Specification, which defines a standard format for bundling and storing a Wasm module and its metadata as an OCI (Open Container Initiative) image in order to facilitate interoperability across different solutions.

September 10, 2020

Flexential announced new dedicated Hosted Private Cloud - vCenter Access capabilities that enable organizations to use industry-leading third-party tools to manage workloads and data protection requirements on a single, consolidated cloud platform.