“In the past two years, there’s been a significant rise in the number of cyberattacks, data breaches, and hacks”.
SkyFlok provides protection against cyberattacks and remove the need to trust any single cloud provider. We empower you to choose the locations and providers where your and your client’s data is stored. You are in control of your files. Since SkyFlok does not store a single file in a single provider, this means that an attack in any single Cloud location does not compromise your data. Finally, SkyFlok keeps all past versions of your files, which means that you can always go back to them.
Secure your valuable files and protect the privacy of your clients’ data with SkyFlok! Join us!
Twistlock and thousands of other attendees will be discussing a variety of open source and cloud native topics while attending KubeCon + CloudNativeCon EU, May 2-4, 2018 in Copenhagen, Denmark.
From Domino’s to Walmart, companies outside of traditional technology sectors are increasingly staking their future on the ability to deliver software applications faster and more reliably than their competition. DevOps, agile development, digital transformation – these buzzed-about terms are the methodologies upon which this acceleration is built. Underpinning these movements is the rise of continuous delivery, microservices, and other cloud native technologies.
But there’s a risky undercurrent to this focus on delivering software faster. Put simply, all the attention has gone to getting applications built and out the door, with very little being put towards ensuring those applications are secure. In the past two years, there’s been a significant rise in the number of cyberattacks, data breaches, and hacks, and as more companies adopt DevOps practices and cloud native technologies while maintaining a traditional security approach,this number is only set to increase.
The Barrier to Entry for Hackers has been Lowered
Whereas launching a cyberattack once took significant technical training, resources, and planning, DIY hacking kits are now traded across the dark web. Anyone willing to spend the money can gain all the necessary tools to launch a crippling attack against a target of their choice. What’s more,while hackers used to seek ongoing control of a company’s systems, or specific information, they now race down the fastest path to cash. Whether that’s ransomware that locks corporate users out of their own systems or cryptominers discreetly installed on line of business applications,both are simpler goals to achieve than ongoing command and control.
Add to this the fact that, at least in the United States, less than 10% of top Computer Science programs require students to complete ANY cybersecurity coursework – and it’s no wonder that 2017 survey from DevOps automation provider Chef showed that only 15% of companies could redress security gaps or compliance violations within hours – with the remaining 85% of organizations needing days, weeks – or even longer to address known flaws in critical applications.
It’s easy to point fingers at Equifax or Panera – who both went months before making necessary patches – but in doing so a bigger picture is missed. The problem is with cybersecurity writ large. he industry has not seen anything like the full-scale reinvention that IT operations saw with the DevOps movement. As a result, security teams lack the tools or training to keep up with their counterparts in development and operations groups.
With this in mind, it’s no wonder that 94% of respondents in a recent survey from analyst firm ESG claimed that technologies such as containers negatively impacted security. While these technologies can actually more secure than the legacy platforms they replace, the traditional approach to security fails entirely when applied in this new world.
It’s time for something to change in the way cybersecurity has been practiced. The remainder of this article lays out five principles for cybersecurity in this era of containers, continuous integration and DevOps. By adopting these principles and choosing tools and processes to complement them, companies can not only empower their security teams to keep up with developers, but they can actually begin to deliver more secure software than ever before possible. Let’s take a look at those five pillars:
Implement Continuous Security and Increase Visibility
“Shift left” is a very buzzy term these days in security. he concept that by integrating security controls earlier into the application delivery pipeline, an organization can improve it’s overall security posture. In itself, that’s a powerful recommendation. By addressing vulnerabilities before applications are ever shipped, organizations can significantly reduce risk. But, this concept alone is not sufficient.
The challenge presented in breaches like Equifax is the gulf between security teams who identify a new vulnerability or risk in running applications, and the development teams responsible for remediation. To close this gap, developers need visibility into the risk posture of their applications even after those applications are deployed in production. If a new CVE is identified in a production application, that information needs to quickly (and ideally automatically) shared with developers along with an assessment of the potential risks. By surfacing this information directly to developers, they’re able to prioritize security work in line with other business needs and address risks sooner after they arise.
Automate Policy Creation & Enforcement
Developers have tools like Jenkins to automatically build and ship their code. Operations teams leverage Ansible or Puppet to automatically scale out their infrastructure. Yet, security teams are left manually configuring firewall rules and writing application-specific security policy. In a world of continuous deployment, this manual effort simply isn’t possible. As a result, many teams shift towards more permissive security policies, increasing their exposure simply to keep up with the speed of software.
In order to address this, security teams must adopt tools that automatically profile applications to create policy, then automatically enforce those policies. This shifts the responsibility of security teams away from being creators of security models, and into a review/approve mindset that better enables them to keep pace with their development counterparts.
Take a Whitelist-First Approach
With the threat landscape shifting by the minute and the number of risks growing exponentially, traditional blacklist based approaches aren’t sufficient for strong security. Modern cybersecurity must use tools like machine learning to automatically profile applications and create models based on expected good behavior — shifting the security posture from “prevent every known bad action” to “allow only known good actions.” This not only provides stronger overall security, but short-circuits the game of catch-up with the bad guys security teams have historically engaged in
Developers Can Help Ensure Applications are “Secure by Design”
Applications are typically developed against a set of business requirements and a set of operational requirements. But it’s equally as important for developers to build towards security needs – understanding not just how an application handles data, but also how to code in a way that reduces risk vectors and. This often involves security teams working directly with development groups to set requirements for each feature. In teams without dedicated security-focused developers, this can be a rotating role,where a member of the team takes ownership of all security features for each sprint or release. This approach helps teams quickly uplevel their overall security knowledge and ensures that building to security requirements is always top of mind.
Defense in Depth
Traditional security tools focused on a single element of the application delivery lifecycle, or a single layer of the stack. You had your network firewall, your application firewall, your active threat protection, your vulnerability management, your source code analysis, and then spent as many cycles integrating them all as you did gaining value from them. Moreover, these tools couldn’t learn from each other. What this means for many organizations is that during an attack, they get alerts on individual steps in the attack, but are left to correlate different anomalies together to form a comprehensive picture of the incident and best understand the impact. This approach doesn’t scale.
Cloud Native Makes All This Possible
We’re proud to work with innovative organizations committed to leveraging containers and cloud native technology throughout their business units. We’re proud to be a trusted partner working with talented teams to scale security in ways never thought possible.
Click here to view original web page at vmblog.com