Poorly set up cloud resources, containers, and orchestration platforms pose security risks that attackers can exploit.
Insecure cloud, container or orchestration configuration
1
Injection flaws arise when untrusted data is treated as executable code or commands, opening avenues for attacks such as SQL injection, command injection, and cross-site scripting .
Injection flaws
2
Weak authentication and authorization controls enable unauthorized access to sensitive data or functions and hardcoded credentials.
Improper authentication & authorization
3
The CI/CD pipeline and software supply chain are crucial in cloud-native development but can be vulnerable.
CI/CD pipeline & software supply chain flaws
4
API keys, passwords, and tokens are vital for cloud-native apps but can be stolen if not securely stored, compromising application security.
Insecure secrets storage
5
Overly permissive network policies in cloud-native applications enable attackers to move laterally and access sensitive resources.
Over-permissive or insecure network policies
6
Cloud-native apps use various components that, if not properly managed, can lead to security vulnerabilities.
Using components with known vulnerabilities
7
Managing assets like containers, images, and logs in cloud-native applications is crucial to prevent vulnerabilities from being exploited due to neglect or mismanagement.
Improper assets management
8
Improperly set resource quotas in cloud-native applications can result in denial-of-service (DoS) attacks due to excessive resource consumption.
Inadequate 'compute' resource quota limits
9
Effective logging and monitoring are vital for detecting security incidents in cloud-native applications.
Ineffective logging & monitoring
10
Don't Go It Alone: Partner with Cloud Security Experts for Maximum Protection.