Consolidating public cloud security with CNAP.

The public cloud provides a highly desirable boost to innovation and productivity for many application development teams, but it also brings new security risks. To protect data and access, organizations are obliged to draw on the capabilities provided by a wide range of cloud security tools.

Unfortunately, operating so many security tools creates substantial management overhead, and leads to siloes of information and alerts that make it difficult to correlate and prioritize based on risk.

Fortunately, an integrated approach is possible through cloud-native application protection platform (CNAPP) functionality that can help security teams better identify, prioritize and remediate risks.

Recognizing the challenge of cloud security

The way we work has changed. Most organizations now use the cloud and have employees working and accessing applications and systems remotely. Accordingly, zero trust, which provides a framework for securing devices, systems and applications in which no user or application is implicitly trusted, is the natural successor to ‘castle and moat’ security of the corporate perimeter.

Zero trust reframes data and access security and as such has gained widespread adoption. Many enterprises are now extending it to application-to-application communication use cases. Compared to a traditional data center, the public cloud has introduced specific challenges for organizations. Firstly, cloud services are dynamic. Automated changes to applications and services happen on a regular basis.

Enterprise IT controls neither the platforms themselves, nor the changes made to the services provided on those platforms.

Secondly, the cloud service estate generates alerts on a regular basis. Most organizations lack sufficient resource to be across all these alerts in a timely way.

Lastly, it is difficult to understand and prioritize true cloud risk. This will depend on each individual use case, taking account of factors such as exposure to the internet, access to sensitive data and broad permissions that could be taken over and exploited should there be a breach.

To secure public cloud implementations, enterprises have called on a range of solutions, each addressing its own specific part of the overall cloud protection problem. However, this multi-solution approach can leave security operations vulnerable to visibility gaps, time-consuming data collation, data overload from multiple sources without prioritization and tool management overheads.

What is CNAPP?

A cloud-native application protection platform (CNAPP) is a platform offering that enables enterprises to build and run secure cloud applications. With CNAPP, companies can identify, prioritize and remediate risks in public cloud infrastructure. CNAPP provides visibility into both the cloud infrastructure and the workloads that run on it.

It provides a single, comprehensive security solution, bringing together the capabilities otherwise provided by multiple tools, to address cloud application risk holistically.

How CNAPP helps

CNAPP helps secure public cloud use for enterprises by consolidating the capabilities that, until now, were provided by a series of individual products in one platform. Think cloud security posture management (CSPM), cloud

infrastructure entitlement management (CIEM), and cloud workload protection platform (CWPP), to name but three. It pulls into a single data source these multiple different discipline areas, enabling organizations to identify and prioritize risks in their environment.

A CNAPP solution can, for example, provide insight into misconfigurations, excessive permissions, vulnerabilities and other security detractors that have already happened, so they can be pinpointed and addressed. It can also identify, by assessing security across those multiple discipline areas, risks that will most likely lead to future security incidents, so they can be prioritized and mitigated.

This consolidated approach to cloud security can dramatically simplify risk management for IT and security teams. A CNAPP can tie together individual incidents and occurrences to present cause and effect. That way, security operations can understand what has happened, why it has, where the vulnerability is and what needs to be done. This brings together the work, of what may have been five or so different tools and a lot of manual effort piecing data together, to arrive at a single, complete picture of a security incident. As a result, enterprises can gain superior insight into incidents and risks for more effective operational management and strategic planning.

Of course, the earlier in the development lifecycle cloud security issues can be identified, the better. If something has to be fixed after it has been deployed, it can mean costly reworks and rerunning of quality assurance testing. Through the seamless integration of a CNAPP solution into developer workflows, risk identification, and therefore incident aversion, is made possible at the time of coding.

A new future for security

With CNAPP, enterprises can gain complete security coverage for today’s cloud environments. Together with a zero trust approach, CNAPP helps organizations evolve their security from the perimeter approach of the past, to one that protects cloud-native applications and services. CNAPP is an ideal platform approach for security teams that need to quickly and efficiently identify and prioritize risks, understand how to remediate incidents and build security risk management into solutions at the time of development.

How smart labels are transforming supply chains

Sharath Muddaiah • 27th January 2025

As e-commerce continues to rise globally, the impact of just-in-time manufacturing and rising consumer expectations mean the need for real-time visibility has never been greater. Smart labels directly address this demand, offering solutions to long-standing challenges like shipment delays, theft, and the lack of traceability. With the smart label market projected to grow from $14.1...

The rise of loyalty apps

Sue Azari • 17th January 2025

Increased choice and a consumer more price sensitive than ever before, has made customers far more likely to shop around for the best deals. Price is now the number one factor in brand consideration. In an effort to bag a bargain, loyalty programs have become increasingly popular with consumers, with nine out of ten in...

Rocket launch challenges Elon Musk’s space dominance

Professor Sultan Mahmud • 16th January 2025

Amazon founder Jeff Bezos’s space company has blasted its first rocket into orbit in a bid to challenge the dominance of Elon Musk’s SpaceX. The New Glenn rocket launched from Cape Canaveral Space Force Station in Florida at 02:02 local time (07:02 GMT). It firmly pits the world’s two richest men against each other in...

Giesecke+Devrient launches new Smart Label at CES 2025

Giesecke Devrient • 06th January 2025

G+D has today launched the G+D Smart Label, its innovative tracking solution that transforms any package into an IoT device. Ultra-thin and only slightly larger than a credit card, the new Smart Label proposition has been jointly developed by G+D in conjunction with its hardware partner, Sensos to enable cost-effective, accurate location tracking for a...

Choose an AI solution to transform beyond technology

Kit Cox • 09th December 2024

The first step is knowing exactly what your business wants to achieve with AI; think faster, smarter and more efficient. Once you know what you are working towards, you can start looking for a solution that can help you make it a reality. AI integration can feel like a daunting task at the beginning, so...

A Roadmap to Security and Privacy Compliance

John Lynch Director of Kiteworks • 04th December 2024

Only by understanding the current regulatory environment and implementing robust data protection measures, can organisations enhance their security posture, ensure compliance, and build resilience against the latest cyber threats. This article provides a comprehensive roadmap of how to do it.

Data-Sharing Done Right: Finding the Best Business Approach

Bart Koek • 20th November 2024

To ensure data is not only available, but also accessible to those that need it, businesses recognise that it is vital to focus on collecting, sorting and governing all the data in their organisation. But what happens when data also needs to be accessed and shared across the business? That is where organisations discover a...