
Intelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets.
Digital transformation efforts involve cloud adoption, cloud-native technology and the development and usage of community-built open source software. Successful digital transformation depends on a company's ability to secure its applications across these technologies. These efforts make Cloud Native Computing Foundation's CloudNativeSecurityCon, held this year in late June, an important conference.
While the work of CNCF is increasingly important, conference attendance was low, with just 500 attendees. In February 2023, the organization held thefirst CloudNativeSecurityCon, and though the timing last year wasn't ideal because it coincided with a COVID-19 resurgence, it had a slightly better turnout with 800 attendees.
I want to call attention to this event because it addresses top challenges and needs for application and cloud security today. Here are some highlights from the show.
New technologies and development processes challenge traditional application security methods. Continuous integration and continuous deployment pipelines and microservices-based applications empower developers to deploy infrastructure, build and release applications and continuously update them.
We talk aboutshifting left to shift security responsibilities to developers to enable them to secure their own code so security doesn't become a bottleneck. CloudNativeSecurityCon is focused on the CNCF community, so attendees included architects, developers, DevOps, site reliability engineers and sys admins. Notably, this is not an audience of application security or security professionals, but cloud-native security depends on education, training and security responsibilities for these nonsecurity roles.
These groups outside of security are doing important work. In his keynote, CNCF CTO Chris Aniszczyk welcomed the attendees as those who are security-minded and described theirshared responsibility to improve security across the cloud-native ecosystem.
We've seen friction before -- security teams want to own application security and all that's involved, including testing, setting policies, monitoring for security issues and remediating issues, and developers need to focus on building applications. But for cloud-native security, security teams need to work with other groups. They need to collaborate with developers and operators to align on common goals and better incorporate security into development processes.
"All the stuff we've built is critical for the world's workloads," Aniszczyk said. "When there's an issue, it affects everyone."
Aniszczyk pointed out the CNCF efforts, including the vast CNCF ecosystem with 200 security and compliance projects. CNCF makes significant investments in security audits, training and resources. It also works on marketing and awareness to encourage use and community contributions to help projects progress along their maturity process, including incubating and graduating projects, such as Falco, Open Policy Agent and Cilium.
CNCF's cloud-native security Technical Advisory Group has a number of working groups on key topics, including software supply chain, controls, automated governance and reviews. The group's "About Us" states "We aim to significantly reduce the probability and impact of attacks, breaches and compromises. By empowering developers and operators to understand and manage the security posture of their systems, we strive to fulfill the promise of enhanced productivity and operational efficiency."
Myrecent research on the growing complexity of software supply chain security showed organizations increasingly use third-party and open source software in their applications. The top challenges and concerns of this include the following:
The CNCF has made significant investments in open source security. Its sister organization, the Open Source Security Foundation (OpenSSF), which is also part of the Linux Foundation, drives community efforts across companies, government agencies and individuals to secure development, maintenance and use of open source software.
The conference included sessions applying many of the OpenSSF projects for secure open source software use. These included Supply-chain Levels for Software Artifacts, Graph for Understanding Artifact Composition, Open Vulnerability Exploitability eXchange, Sigstore and OpenSSF Scorecard.
One session had updates on Sigstore, the free signing device for software developers to track modifications and verify the authenticity of open source components. Created by companies including Google, Chainguard, Red Hat and Stacklok, Sigstore has become the de facto approach to code signing for open source software. It has also been adopted by major cloud-native projects, including Kubernetes and Helm, and NPM, the node package manager for JavaScript. Today, Sigstore has more than 58 repositories spanning many libraries, including Go, Rust and JavaScript.
A session with Trevor Rosen, staff engineering manager at GitHub, addressed capabilities to best source open source software. Another interesting session by Harry Toor, chief of staff at OpenSSF, covered AI's role in shaping the future of the secure open source software ecosystem, describing possible scenarios and optimizing its usage.
Recentresearch on cloud detection and response from TechTarget's Enterprise Strategy Group showed the challenges security teams face with the dynamic nature of cloud-native applications and elastic cloud infrastructure. To address these, teams need full visibility to monitor, collect and process data and information from necessary telemetry sources.
The conference included sessions on observability, vulnerability management, security posture management, threat modeling, data harvesting and forensics investigations.
In a keynote address, Alexander Lawrence, field CISO at Sysdig, described the importance of enabling teams to "move at incredible speed" and challenged the audience to find ways to apply security programs to most effectively use time, people and processes.
Many other conference sessions echoed Lawrence's sentiment. For example, sessions focused on container security and vulnerability management efficiency with speakers from vendors including AWS, Aqua and Red Hat. An interesting session by Dakota Riley, vice president of cloud engineering at Aquia, looked at building Kubernetes detection into autologs to detect attacks on Kubernetes clusters.
A handful of the sessions covered how to ensure security with the increased use of AI. One session addressed implementing a risk management framework with policy-as-code automation, security controls for responsible AI use and compliance. Robert Ficcaglia, CTO at SunStone Secure, described the uniqueness of AI security and privacy, the need for threat modeling and red teaming, useful industry frameworks and ways to apply controls to mitigate risk.
Another interesting session by Frederick Kautz, director of research and development at TestifySec, was about how to apply CNCF and OpenSSF projects to secure the AI supply chain. He described using in-toto, which is a framework to secure the integrity of software supply chains, to create a layout defining a path to ensure security of AI and machine learning models. The tool helps ensure models are not tampered with and applies attestations to handle data inputs and outputs.
CloudNativeSecurityCon andother CNCF events do a good job emphasizing the importance of people and the community sharing their experiences and ideas to improve security -- even as the excitement and hype around automation and AI abounds.
People who were unable to attend should check out this year's conference sessions, now availableonline. Doing so will enable you to catch up on the latest techniques for application security, security operations, identity and access management for machine workloads, and threat detection and response.
Melinda Marks is a practice director at TechTarget's Enterprise Strategy Group, where she covers cloud and application security.
Enterprise Strategy Group is a division of TechTarget. Its analysts have business relationships with technology vendors.
FWA delivers wireless broadband internet to remote regions, temporary setups and other locations not suitable for wired ...
The internet would be different today without DNS anchoring digital communications. Companies can take some basic steps to ensure...
Cisco's entrée into 102.4 Tbps silicon boasts in-place programmability and new AgenticOps features as enterprise AI ...
The current AI hype era resembles the dot-com bubble era in some ways, but there are significant differences as well.
Rimini Street's CIO explains how he deployed agentic AI for research and service -- and how an AI steering committee governs ...
Agentic AI is forcing CIOs to rethink IT strategy. Success depends on identifying key use cases, assessing data readiness, ...
With Windows 10 end of support now past, enterprises must evaluate whether to upgrade to Windows 11 based on hardware readiness, ...
Risk is no longer centered only in core systems. Identity, hiring, endpoints and partner platforms are where exposure ...
The Windows 10 end-of-support deadline forces IT teams to choose between Windows 11 migration, ESU enrollment and broader desktop...
Q4 cloud infrastructure service revenues reach $119.1 billion, bringing the 2025 total to $419 billion. See how much market share...
Will $5 trillion in AI infrastructure investment be enough? Cloud providers facing that question must also yield a return, ...
As IT leaders aggressively re-allocate capital to fund new AI initiatives, repatriation offers both savings and greater control, ...
With AI agents increasingly acting as digital concierges for shoppers, verifying bot identities, securing the APIs they rely on, ...
The ICO has won an important appeal relating to data protection obligations arising from a 2017-18 cyber attack at electronics ...
A newly-uncovered malware targeting the Android operating system seems to exploit Google’s Gemini GenAI tool to help it maintain ...