3 large takeaways from the Snyk State of Cloud Security 2022 Report

0
233
3 large takeaways from the Snyk State of Cloud Security 2022 Report


Cloud computing has created an even bigger shift within the IT trade over the last 20 years than another issue. With cloud know-how, corporations can construct, deploy, and scale their functions quicker than ever. However, cloud prospects have been struggling a variety of safety occasions inside the previous 12 months, with knowledge breaches, knowledge leaks, and intrusions into their environments among the many most critical. 

Snyk not too long ago surveyed greater than 400 cloud engineering and safety professionals and leaders throughout varied organisation sorts and industries. Created in partnership with Propeller Insights, the findings are summarised within the Snyk State of Cloud Security 2022 report. The report takes a deep dive into the dangers and challenges they face, and the place they’re efficiently addressing these dangers. 

According to the State of Cloud Security 2022 Report, 80% of organisations suffered a critical incident inside the final 12 months, and 33% suffered a cloud knowledge breach.The shift to builders constructing and working apps natively within the cloud is altering cloud safety, based on insights. In the ensuing report, Snyk’s cloud safety researchers mixed their evaluation of the survey knowledge with observations from their very own expertise. Here are the three large takeaways.

Cloud native functions circumstances convey new safety challenges — and alternatives

The predominant cloud use case has been as a platform for internet hosting third-party functions or functions migrated out of their knowledge facilities. 1 / 4 of Snyk’s survey respondents indicated that the first use for cloud environments is creating and working functions natively within the cloud.

Teams utilizing the cloud as a platform have produced quite a few improvements, together with Infrastructure as Code (IaC), the coding course of builders use to construct and handle cloud infrastructure alongside their functions. 

Additionally, builders leveraging the cloud are making rising use of cloud native approaches, similar to containers and serverless “functions as a service” architectures. 

These adjustments have implications for safety. 41% of groups adopting cloud native approaches confirmed that doing so has elevated their safety complexity. Cloud native approaches additionally require groups so as to add further safety experience and introduce further safety coaching. Cloud native additionally necessitates the adoption of recent safety tooling and methodologies, similar to a “Shift Left” strategy.

But whereas constructing and working functions within the cloud brings new safety challenges, groups utilizing this strategy are experiencing fewer critical safety incidents. The subsequent two large takeaways from the report assist clarify why. 

Developers are taking possession of cloud safety

Who owns cloud safety? Depending on who you ask, you’re more likely to get a unique reply. While IT owns cloud safety in roughly half of all organisations, 42% of cloud engineers say that their group is primarily chargeable for cloud safety. However,  solely 19% of safety professionals agree that engineering groups are doing that work. 

This could also be defined by the truth that cloud engineers are investing important effort and time into cloud safety duties, and so they’re typically in search of methods to automate and streamline these processes. The adoption of infrastructure as code for deploying and managing cloud environments supplies engineers with the chance to seek out and repair points in growth reasonably than post-deployment, when remediations require extra time and sources.

Developers management the cloud computing infrastructure itself as a result of the cloud is totally software-defined. When they construct functions within the cloud, they’re additionally constructing the infrastructure for functions as a substitute of shopping for a pile of infrastructure and including apps. That is a coding course of utilizing Infrastructure as Code (IaC), and builders personal that course of. 

Infrastructure as code safety delivers an enormous ROI 

IaC safety is a big win — not only for decreasing the speed of misconfiguration, however for bettering engineering group productiveness and velocity of deployments. Inefficient cloud safety processes typically grow to be the rate-limiting issue for how briskly groups can go within the cloud, and IaC safety delivers important enhancements in velocity and productiveness. 

The median discount within the fee of misconfiguration in working cloud environments ensuing from IaC safety pre-deployment is 70%. While IaC safety can’t forestall all runtime misconfigurations, a 70% drop is critical, and might decrease the chance for organisations considerably.

That lower within the variety of misconfigurations additionally has a direct affect on cloud engineering productiveness.  Because these groups can scale back the period of time they should spend money on managing and remediating issues, they’ll spend extra time constructing and including worth to the organisation. 

What efficient cloud safety groups are doing

A transparent majority of cloud safety and engineering professionals consider that the chance of a cloud knowledge breach at their organisation will enhance over the following 12 months, with solely 20% anticipating dangers to lower.

Effective cloud safety requires stopping misconfigurations and architectural design vulnerabilities that make cloud assaults doable. Success requires specializing in these 5  basic areas: 

  1. Know your setting. Maintain consciousness of the configuration state of your cloud setting in full context with the functions it runs and the SDLC used to develop, deploy, and handle it. 
  • Focus on prevention and safe design. Prevent the circumstances that make cloud breaches doable, together with useful resource misconfigurations and architectural design flaws. You can’t depend on the power to detect and stop assaults in progress. 
  • Empower cloud builders to construct and function securely. When engineers develop safe infrastructure as code, they’ll keep away from time-consuming remediations and rework later, whereas delivering safe infrastructure quicker.
  • Align and automate with coverage as code (PaC): If your safety insurance policies are expressed solely in human language, they may as properly not exist in any respect. With PaC, you may categorical insurance policies in a language different applications can use to validate correctness, and also you’ll align all stakeholders to function underneath a single supply of belief on safety coverage.  
  • Measure what issues: establish what issues probably the most, be it decreasing the speed of misconfiguration, dashing up approval processes, or bettering group productiveness. Security groups ought to set up safety baselines, set targets, measure progress, and be able to reveal the safety of their cloud setting at any time.

Following these 5 steps permits safety and engineering groups to work collectively to operationalise cloud safety, which reduces threat, accelerates innovation, and improves group productiveness. 

LEAVE A REPLY

Please enter your comment!
Please enter your name here