当前位置:网站首页>Six noteworthy cloud security trends in 2022
Six noteworthy cloud security trends in 2022
2022-07-29 01:42:00 【Super technology】
Many innovations have triggered a new wave of Technology —— From the prosperity of server free technology ( Allow companies to expand and build platforms at an unprecedented rate ) To the development of cloud automation and security . These innovations enable organizations to improve business agility and reduce costs ; But they also increase the attack surface , just as IDC As a recent report proves , The report emphasizes 98% In the past 18 At least once a month, I have suffered from cloud security vulnerabilities .

Based on these changes , The following is expected to be in 2022 Major cloud security trends in .
1、 Server free growth
We see more and more organizations adopting serverless architecture in their platforms .Serverless It refers to those applications that completely rely on the services hosted on the third-party cloud to complete the server-side code logic and manage the state . Serverless architecture means that we can not only take advantage of cloud service providers FaaS( Function as a service ) service , You can also mine various available serverless products . With the introduction of new serverless products every quarter , It is important to understand the potential risks that may arise .
for example ,AWS Pinpoint It's a kind of AWS service , It provides email 、SMS Messaging and marketing tools , Easy to set up and start integration Lambda、API Gateway, etc. . With countless integration options and functions , It's for application developers and the cloud IT The team knows what the security configuration is , And the potential risks associated with these tools .
We also see things like “ No issue ” Architecture and the like are used across multiple CSP Of FaaS Architecture for more control . As control over these types of architectural decisions increases , There is a new way to consider security . We have been paying attention to these new models , And is studying how to consider security when using more serverless Services . In the coming year , We will pay close attention to serverless , And how best to protect it , At the same time, improve efficiency and reduce risk .
2、DevSecOps
More and more organizations are beginning to fully adopt infrastructure, that is, code (IaC) To create a completely autonomous cloud based environment . From a security point of view , Ensuring that the supply chain from code to production is protected and monitored is becoming a growing concern for organizations . We see that tools in this field are beginning to mature , And is implementing a new strategy . for example , You can perform pre verification of configuration and architecture , Make sure your architecture and code are compliant and secure before they go into production . In the coming year , We hope to see more third-party tools and native cloud services introduced , To better support the entire supply chain .

3、 Cloudy strategy
The cloudy strategy will continue —— Many enterprises are choosing the technology that best suits their platform , At the same time, we are also creating an elastic architecture utilizing multiple cloud service providers . We will soon see this model mature with multicloud security practices and tools . Besides , We see “ cloudy ” Surround the edge calculation , It will continue to expand to the factory floor , And branches and private data centers . We are monitoring the development of this field , And develop new ways to adopt a multi cloud strategy for the organization .
4、 Application structure
The line between application developers and infrastructure engineers has become very blurred . Developers are creating cloud architectures based on the services they are trying to use , Or create a new infrastructure from their code base . Cross functional teams began to work together , Think about how security plays a role in this new way of thinking . We found potential new attack vectors and security configurations that help customers understand the impact . We see that this trend continues .
5、SaaS Security
In the past year , We see the use of SaaS Violations of the platform have proliferated . With this growth , And we saw that SaaS The growth of security products and tools . One of these areas is SaaS Safety state management (SSPM) Tools .
SSPM Is helping organizations to understand their overall SaaS Product portfolio , To ensure that they are in compliance with the pulse of the activity .2021 year , We see this SSPM About a dozen platforms have been adopted , But in 2022 year , We will see what these tools support SaaS The number of platforms has increased significantly . The organization began to create a stronger SaaS Security plan , The plan can cover their entire product portfolio , From the induction and validation of cloud based suppliers to their ecosystem SaaS Supplier monitoring and alerts .

6、 With attribute based access control (ABAC) Dynamic access policy
ABAC Use tags to dynamically determine access rights . for example , If I have a label “ project ”, I can build a strategy , If the label on the body “ project ” The value of is the same as the label on the target resource or environment “ project ” The value of matches , Then grant permission . This allows for more scalable and reusable strategies , Simplify management and improve privilege isolation . Although many cloud service providers have not yet implemented this new approach in all services ( Minimize its utility ), But we are happy to see the adoption and growth of this new method in the coming year .
As more and more organizations adopt work from home and mixed environments , And transfer the workload and data to the cloud , We need to protect the cloud supporting infrastructure from the beginning . Cloud is the driver of enterprise productivity , But it must be used with the safety first method , To minimize risk , At the same time, improve productivity .
The original is translated from helpnetsecurity, author Romke de Haan, Super technology translation , Please indicate the source and original text of the reprint of the cooperation site. The translator is super technology !
Hi, I'm super technology
Super technology is an information security expert , Can defend without upper limit DDos Attack and CC attack , Alibaba cloud strategic partner !
边栏推荐
- We summarized the three recommendations for the use of Nacos and first published the Nacos 3.0 plan for the 4th anniversary of the open source of Nacos
- Three ways of creating indexes in MySQL
- nep 2022 cat
- 全面升级,你能想象的都在这————京东API接口
- HCIA配置实例(eNSP)
- Redis installation, cluster deployment and common tuning
- Introduction to Elmo, Bert and GPT
- Nacos installation guide on win system
- 我们总结了 3 大Nacos使用建议,并首次公开 Nacos 3.0 规划图 Nacos 开源 4 周年
- 【观察】三年跃居纯公有云SaaS第一,用友YonSuite的“飞轮效应”
猜你喜欢

易观分析:以用户为中心,提升手机银行用户体验,助力用户价值增长

Redis installation, cluster deployment and common tuning

活动速递| Apache Doris 性能优化实战系列直播课程初公开,诚邀您来参加!

Flink SQL Hudi actual combat

PLATO上线LAAS协议Elephant Swap,用户可借此获得溢价收益

Merkel Studio - harmonyos implementation list to do

5G 商用第三年:无人驾驶的“上山”与“下海”

After understanding the composition of the URL of the website, we use the URL module, querystring module and mime module to improve the static website

【Unity项目实践】合成大西瓜

了解各种路径
随机推荐
承办首届算力大会,济南胜在何处?
Analyzing the function of human-computer interface module of runtime manager based on autoware
Docker compose install MySQL
body中基本标签
API stability guarantee of Prometheus
SQL question brushing: find the employee number EMP with more than 15 salary records_ No and its corresponding recording times t
C language 300 lines of code to achieve mine sweeping (deployable + markable + changeable difficulty level)
nep 2022 cat
T-sne dimensionality reduction
MySQL execution order
Cross modal alignment 20220728
Redis is installed on Linux
Openpyxl border
ELS square movement
SQL injection of DVWA
【HCIP】MPLS 基础
Flink SQL Hudi actual combat
SQL question brushing: find the last of all employees_ Name and first_ Name and corresponding department number Dept_ no
Flask project construction 2
Code generator