{"id":1074,"date":"2020-06-23T14:41:20","date_gmt":"2020-06-23T09:11:20","guid":{"rendered":"https:\/\/www.trendstechblog.com\/?p=1074"},"modified":"2020-06-23T14:41:42","modified_gmt":"2020-06-23T09:11:42","slug":"critical-security-aspects-in-cloud-applications","status":"publish","type":"post","link":"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/","title":{"rendered":"Critical Security Aspects In Cloud Applications"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_58 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-655df40ca7179\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-655df40ca7179\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/#Scanning_And_Detection_Are_Critical\" title=\"Scanning And Detection Are Critical\">Scanning And Detection Are Critical<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/#Cloud_Applications_Target_More_Than_One_Environment\" title=\"Cloud Applications Target More Than One Environment\">Cloud Applications Target More Than One Environment<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/#Whole-Body_And_Luggage_Scanners\" title=\"Whole-Body And Luggage Scanners\">Whole-Body And Luggage Scanners<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/#Boarding_Pass_Scanner\" title=\"Boarding Pass Scanner\">Boarding Pass Scanner<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/#Incoming_Protection\" title=\"Incoming Protection\">Incoming Protection<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Scanning_And_Detection_Are_Critical\"><\/span>Scanning And Detection Are Critical<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/en.wikipedia.org\/wiki\/Digital_transformation\"><strong>digital transformation<\/strong><\/a><\/span> is driving companies to move important applications to public clouds and containers. Therefore, they have to use the same multi-layer security approach. Palo Alto Networks explains why in this environment virtual and container NGFWs (New Generation Firewalls) are essential for security in the cloud.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Cloud_Applications_Target_More_Than_One_Environment\"><\/span>Cloud Applications Target More Than One Environment<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Most companies today use data centers and several public clouds, in the form of the multi-cloud. They also run workloads, some of which may be containerized or serverless today. However, most companies still have a variety of bare metal servers, virtual machines, and even mainframes.<\/p>\n<p>Where the workloads are running, what matters is the enterprise applications that run on hybrid infrastructures. These applications tend to be closely related. Most applications are connected to core services such as Active Directory, administration, monitoring, and logging of the infrastructure. Many of these applications are also connected to critical databases that run on legacy systems such as Solaris or mainframes. Because it is the network that connects these applications, network security must span the entire infrastructure. For this reason, network protection for native cloud applications needs to be tackled holistically.<\/p>\n<p>Complete network protection requires next-generation firewalls and identity-based micro-segmentation. Since the cloud journey is a constant journey, it is important to get a complete overview of all connections made via the network. This includes connections from the Internet to workloads, workloads towards the Internet, and workloads to workloads.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Whole-Body_And_Luggage_Scanners\"><\/span>Whole-Body And Luggage Scanners<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This level aims to ensure that people heading for departing aircraft do not carry anything dangerous with them. Security guards do this with scanners that examine people, luggage, and countless small items. The airport authorities use this procedure in strategic locations. Some airports have only one security and scan station at the entrance, while larger airports usually have one or more at the border of each terminal.<\/p>\n<p>This is where the next generation firewalls come into play in the world of IT because they are aimed at these security scans. Just as security is deployed at strategically selected perimeters at the airport, NGFWs must be deployed at carefully selected perimeters or trust limits.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Boarding_Pass_Scanner\"><\/span>Boarding Pass Scanner<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This level of inspection aims to reduce the area of attack by minimizing the movement of people to places they should not go. Boarding pass scanners are used at every gate &#8211; usually as close as possible to the boarding entrance of the respective aircraft. Just as boarding pass scanners are used at every gate of an airport, micro-segmentation has to be enforced for every workload. Agent-based solutions are best suited to enforce micro-segmentation policies directly at the workload level.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Incoming_Protection\"><\/span>Incoming Protection<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>To make applications available to users on the Internet, the workloads must accept connections from the Internet. Most modern applications are provided via HTTPS. Incoming connections are generally protected by cloud-based web application firewalls (WAFs). However, most workloads must accept incoming connections, not just the Internet. These include orchestration and monitoring tools such as Terraform and Puppet, connections to MySQL ports by database administrators, and the SSH \/ RDP ports by server administrators.<\/p>\n<p><span style=\"color: #0000ff;\"><strong>Also Read: <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.trendstechblog.com\/new-improvements-to-the-glass-storage-media\/\">New Improvements To The Glass Storage Media<\/a><\/span><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Scanning And Detection Are Critical The digital transformation is driving companies to move important applications to public clouds and containers&#8230;.<\/p>\n","protected":false},"author":1,"featured_media":1075,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[169],"tags":[151],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Critical Security Aspects In The Cloud Applications<\/title>\n<meta name=\"description\" content=\"The digital transformation is driving companies to move important applications to public clouds and containers. Therefore, they have to use the same.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical Security Aspects In The Cloud Applications\" \/>\n<meta property=\"og:description\" content=\"The digital transformation is driving companies to move important applications to public clouds and containers. Therefore, they have to use the same.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"Trends Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-23T09:11:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-23T09:11:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Critical-Security-Aspects-In-Cloud-Applications-Jpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TrendsTechBlog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:site\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TrendsTechBlog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/\"},\"author\":{\"name\":\"TrendsTechBlog\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"headline\":\"Critical Security Aspects In Cloud Applications\",\"datePublished\":\"2020-06-23T09:11:20+00:00\",\"dateModified\":\"2020-06-23T09:11:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/\"},\"wordCount\":532,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"keywords\":[\"Security\"],\"articleSection\":[\"SECURITY\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/\",\"url\":\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/\",\"name\":\"Critical Security Aspects In The Cloud Applications\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#website\"},\"datePublished\":\"2020-06-23T09:11:20+00:00\",\"dateModified\":\"2020-06-23T09:11:42+00:00\",\"description\":\"The digital transformation is driving companies to move important applications to public clouds and containers. Therefore, they have to use the same.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trendstechblog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SECURITY\",\"item\":\"https:\/\/www.trendstechblog.com\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Critical Security Aspects In Cloud Applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trendstechblog.com\/#website\",\"url\":\"https:\/\/www.trendstechblog.com\/\",\"name\":\"Trends Tech Blog\",\"description\":\"Daily Tech Updates\",\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trendstechblog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\",\"name\":\"TrendsTechBlog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"contentUrl\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"width\":280,\"height\":70,\"caption\":\"TrendsTechBlog\"},\"logo\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\"},\"description\":\"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical Security Aspects In The Cloud Applications","description":"The digital transformation is driving companies to move important applications to public clouds and containers. Therefore, they have to use the same.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/","og_locale":"en_US","og_type":"article","og_title":"Critical Security Aspects In The Cloud Applications","og_description":"The digital transformation is driving companies to move important applications to public clouds and containers. Therefore, they have to use the same.","og_url":"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/","og_site_name":"Trends Tech Blog","article_published_time":"2020-06-23T09:11:20+00:00","article_modified_time":"2020-06-23T09:11:42+00:00","og_image":[{"width":1280,"height":675,"url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Critical-Security-Aspects-In-Cloud-Applications-Jpg.jpg","type":"image\/jpeg"}],"author":"TrendsTechBlog","twitter_card":"summary_large_image","twitter_creator":"@trendstechblog","twitter_site":"@trendstechblog","twitter_misc":{"Written by":"TrendsTechBlog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/#article","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/"},"author":{"name":"TrendsTechBlog","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"headline":"Critical Security Aspects In Cloud Applications","datePublished":"2020-06-23T09:11:20+00:00","dateModified":"2020-06-23T09:11:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/"},"wordCount":532,"commentCount":0,"publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"keywords":["Security"],"articleSection":["SECURITY"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/","url":"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/","name":"Critical Security Aspects In The Cloud Applications","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/#website"},"datePublished":"2020-06-23T09:11:20+00:00","dateModified":"2020-06-23T09:11:42+00:00","description":"The digital transformation is driving companies to move important applications to public clouds and containers. Therefore, they have to use the same.","breadcrumb":{"@id":"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trendstechblog.com\/critical-security-aspects-in-cloud-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trendstechblog.com\/"},{"@type":"ListItem","position":2,"name":"SECURITY","item":"https:\/\/www.trendstechblog.com\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Critical Security Aspects In Cloud Applications"}]},{"@type":"WebSite","@id":"https:\/\/www.trendstechblog.com\/#website","url":"https:\/\/www.trendstechblog.com\/","name":"Trends Tech Blog","description":"Daily Tech Updates","publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trendstechblog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1","name":"TrendsTechBlog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/","url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","contentUrl":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","width":280,"height":70,"caption":"TrendsTechBlog"},"logo":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/"},"description":"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News."}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/1074"}],"collection":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/comments?post=1074"}],"version-history":[{"count":1,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/1074\/revisions"}],"predecessor-version":[{"id":1076,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/1074\/revisions\/1076"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media\/1075"}],"wp:attachment":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media?parent=1074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/categories?post=1074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/tags?post=1074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}