{"id":43831,"date":"2021-04-30T11:42:58","date_gmt":"2021-04-30T15:42:58","guid":{"rendered":"https:\/\/sdtimes.com\/?p=43831"},"modified":"2021-05-03T09:41:38","modified_gmt":"2021-05-03T13:41:38","slug":"the-evolution-and-future-of-cloud-native-security","status":"publish","type":"post","link":"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/","title":{"rendered":"The evolution and future of cloud-native security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">With the acquisition of my company, <a href=\"https:\/\/www.stackrox.com\/\">StackRox<\/a>, by cloud-native technology vendor <a href=\"http:\/\/redhat.com\/\">Red Hat<\/a>, it seems like a good time to reflect on the state of cloud-native security.\u00a0 <a href=\"https:\/\/sdtimes.com\/tag\/security\/\">Security<\/a> in the cloud has been my life for the past five years, and it&#8217;s changed very quickly as new cloud-native platforms have taken over the industry.\u00a0 We&#8217;ve had to create new tools and approaches to meet the new technologies and workflows of today&#8217;s cloud and will need to continue evolving them to meet the challenges of tomorrow&#8217;s.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before we get into the future of cloud-native security, though, let&#8217;s look at where we started in the distant past of &#8230; seven years ago.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our industry started with a focus on basic security hygiene for containers, which formed the basis for &#8220;container security.&#8221;\u00a0 While container-related technologies had existed for over a decade, Docker provided the toolset that popularized the Linux container as a standard distribution format for applications, making it widely accessible and adopted.\u00a0 While it started out with developers building and running containerized apps on their local machines, Docker containers rapidly found their way into many software environments.<\/span><\/p>\n<p><strong>RELATED CONTENT:\u00a0<a href=\"https:\/\/sdtimes.com\/softwaredev\/4-reasons-the-future-of-cloud-native-software-is-open-source\/\">4 reasons the future of cloud-native software is open source<\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Suddenly, with thousands of applications being distributed via Docker Hub, people realized this new, emerging area of the stack created new security problems. One of the most straightforward to address first was preventing obviously vulnerable software from being introduced into production environments. Container image scanning became commonplace, with many different options available, including open-source scanners like Clair and OpenSCAP, paid offerings like Black Duck, and ones proprietary to cloud providers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;The Clair team built it in 2015 to detect vulnerabilities as soon as images were pushed to a registry. By making your container contents more visible, we helped mitigate the distribution of vulnerable applications across servers and workstations. This may sound historical, but many popular public container images are still vulnerable,&#8221; remarked Louis DeLosSantos of the Clair project.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Image scanning was &#8220;good enough&#8221; for most users since they were still running containers in a limited context, such as for non-sensitive web apps, or strictly in development and testing.\u00a0 But then organizations started running containers in production and everyone had to think about baseline security best practices for the underlying container infrastructure, which led to the Center For Internet Security (CIS) Benchmark for Docker and other tools and guidelines such as those published by the National Institute of Standards and Techonlogy (NIST).\u00a0 A few platforms, like OpenShift and CoreOS, extended this approach with security modules to further lock down the operating system on the underlying nodes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Generally speaking, this combination of image scanning and secure infrastructure configuration then became the new &#8220;good enough&#8221; for production deployments, partly because there was no standard for container orchestration yet.\u00a0 The major competing orchestration systems\u00a0 (including Kubernetes, Fleet, Docker Swarm, Marathon, and others) each varied in their feature set, meaning that security tools would have to play to the lowest common denominator to support all of them.\u00a0 Where the security functionality they provided wasn&#8217;t sufficient for users, a new ecosystem of container security vendors quickly emerged to fill in the gaps and augment the major platforms.\u00a0 They provided &#8212; and continue to provide &#8212; solutions for security use cases such as runtime security, compliance, and network segmentation.<\/span><\/p>\n<h5><strong>Progressing to Kubernetes Security<\/strong><\/h5>\n<p><span style=\"font-weight: 400;\">As Kubernetes became the dominant orchestration platform, container security evolved into Kubernetes security, the foundation for cloud-native security today. Enterprises rapidly increased their adoption of cloud-native technologies and matured their usage patterns of containerized applications: running in production, deploying sensitive workloads, scaling to hundreds of nodes, and implementing multi-tenant and multi-cluster scenarios. As a result, it eventually became clear that the only way to effectively manage security is to align with the system that is managing the applications that need to be protected.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a result, we started extending security use cases into the Kubernetes infrastructure itself.\u00a0 Vulnerability management meant supplementing image scanning with scanning for, and fixing, vulnerabilities within the Kubernetes control plane and node components.\u00a0 Configuration management evolved to encompass securing Kubernetes configurations rather than just container configurations. CIS released a Kubernetes security benchmark.\u00a0 Security vendors developed\u00a0 threat detection methodologies focused on finding exploits to Kubernetes components like the Dashboard and malicious activity such as cryptojacking; Microsoft researchers published a Kubernetes Threat Matrix based on the well-known MITRE ATT&amp;CK framework.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This shift to Kubernetes security was also reflected in community efforts that focused on identifying security issues within, and protecting, Kubernetes itself.\u00a0 The Cloud Native Computing Foundation performed a security audit of the main Kubernetes components.\u00a0 The Kubernetes community launched SIG-Security, as well as requiring all component teams to have a member responsible for security, and switching the default settings for controls such as Role-Based Access Control (RBAC) in Kubernetes from optional to mandatory.<\/span><\/p>\n<h5><strong>The Future: Kubernetes-Native Security<\/strong><\/h5>\n<p><span style=\"font-weight: 400;\">The next phase of cloud-native security is already underway, and we are progressing from &#8220;Kubernetes security&#8221; to &#8220;Kubernetes-native security,&#8221; as we describe in our whitepaper.\u00a0 The small difference between those two phrases belies a widespread evolution in integration, tooling, and approaches.\u00a0 Kubernetes-native security ensures that security is\u00a0 tightly coupled with the underlying Kubernetes platform (such as OpenShift) and extends security controls by taking advantage of the extensibility of Kubernetes.\u00a0 Features like Custom Resource Definitions (CRDs), created to enable application automation, also allow us to achieve security automation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A key element of Kubernetes-native security is making the stack &#8220;secure by default.&#8221;\u00a0 We know that users frequently stick to default configurations, which historically have been left insecure for operational convenience or backwards compatibility. With Kubernetes-native security, there is also the opportunity to provide all the capabilities that someone needs across the full application lifecycle for many different common scenarios, whether dev\/test or production, single or multi-cluster, and public web apps or ones that process and store sensitive data.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Aside from integration with native Kubernetes extension points, cloud-native security will also succeed through close integration with <a href=\"https:\/\/sdtimes.com\/tag\/devops\/\">DevOps<\/a> practices and teams, allowing them to manage their security declaratively the same way they manage their infrastructure and workloads. This is what we mean when we refer to the phrase &#8220;shift left&#8221;: embed and automate security in the workflows that people already use instead of making it an exception.\u00a0 DevOps teams are the new security users we must enable, and our security tooling must be built with them in mind.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;By shifting security left with DevSecOps and leveraging Kubernetes to define security controls as code with a trusted, automated application and deployment pipeline, organizations can achieve highly scalable security and compliance, while spending less time remediating and more time innovating,\u201d explained Chris Van Tuin, West Region Chief Solutions Architect, Red Hat.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Newer technologies like serverless platforms and service meshes, like early orchestration, are still more fragmented and as a result don&#8217;t yet have comprehensive security practices.\u00a0 However, since most of these are built on top of Kubernetes, they too benefit from a Kubernetes-native security approach.\u00a0 We can also extend our approach to cover the new security use cases that arise when they are used.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cloud-native security continues to evolve and improve rapidly.\u00a0 Since so much of it is open source, you can keep current on it by participating in the Kubernetes and CNCF security SIGs and following projects like Clair, StackRox, OpenShift, and many others. As you continue on your journey with Kubernetes, you can expect security to continually evolve to meet the demands of your business.<\/span><\/p>\n<p>To learn more about the transformative nature of cloud-native applications and open source software, check out KubeCon \/ CloudNativeCon Europe 2021, a virtual event hosted by the Cloud Native Computing Foundation, which takes place May 4\u2013May 7. For more information or to register for the event,\u00a0<a href=\"https:\/\/events.linuxfoundation.org\/kubecon-cloudnativecon-europe\/\" target=\"_blank\" rel=\"noopener noreferrer\">go here<\/a>.<\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>With the acquisition of my company, StackRox, by cloud-native technology vendor Red Hat, it seems like a good time to reflect on the state of cloud-native security.\u00a0 Security in the cloud has been my life for the past five years, and it&#8217;s changed very quickly as new cloud-native platforms have taken over the industry.\u00a0 We&#8217;ve  &hellip; <a class=\"read-more\" href=\"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/\">continue reading<\/a><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":1011,"featured_media":43833,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"cybocfi_hide_featured_image":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[10716,2529,2790,220,45,14338],"coauthors":[15678],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The evolution and future of cloud-native security - SD Times<\/title>\n<meta name=\"description\" content=\"Cloud-native security has changed very quickly and will need to continue to evolve to meet tomorrow&#039;s challenges\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The evolution and future of cloud-native security - SD Times\" \/>\n<meta property=\"og:description\" content=\"Cloud-native security has changed very quickly and will need to continue to evolve to meet tomorrow&#039;s challenges\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/\" \/>\n<meta property=\"og:site_name\" content=\"SD Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SDTimesD2\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-30T15:42:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-03T13:41:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sdtimes.com\/wp-content\/uploads\/2021\/04\/thunderstorm-3441687_640.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wei Lien Dang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:site\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wei Lien Dang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/\"},\"author\":{\"name\":\"Wei Lien Dang\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/c74b73870eee1dcf19604b757fbf6f63\"},\"headline\":\"The evolution and future of cloud-native security\",\"datePublished\":\"2021-04-30T15:42:58+00:00\",\"dateModified\":\"2021-05-03T13:41:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/\"},\"wordCount\":1286,\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2021\/04\/thunderstorm-3441687_640.jpg\",\"keywords\":[\"cloud native\",\"containers\",\"Kubernetes\",\"Red Hat\",\"security\",\"stackrox\"],\"articleSection\":[\"Latest News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/\",\"url\":\"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/\",\"name\":\"The evolution and future of cloud-native security - SD Times\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2021\/04\/thunderstorm-3441687_640.jpg\",\"datePublished\":\"2021-04-30T15:42:58+00:00\",\"dateModified\":\"2021-05-03T13:41:38+00:00\",\"description\":\"Cloud-native security has changed very quickly and will need to continue to evolve to meet tomorrow's challenges\",\"breadcrumb\":{\"@id\":\"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/#primaryimage\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2021\/04\/thunderstorm-3441687_640.jpg\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2021\/04\/thunderstorm-3441687_640.jpg\",\"width\":640,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sdtimes.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The evolution and future of cloud-native security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sdtimes.com\/#website\",\"url\":\"https:\/\/sdtimes.com\/\",\"name\":\"SD Times\",\"description\":\"Software Development News\",\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sdtimes.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sdtimes.com\/#organization\",\"name\":\"SD Times\",\"url\":\"https:\/\/sdtimes.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"width\":225,\"height\":90,\"caption\":\"SD Times\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SDTimesD2\",\"https:\/\/x.com\/sdtimes\",\"https:\/\/www.linkedin.com\/company\/sdtimes\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/c74b73870eee1dcf19604b757fbf6f63\",\"name\":\"Wei Lien Dang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/image\/a8b652316250da08e2db6cbaab487f8f\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d06749c91526468b12244ce1ceb215f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d06749c91526468b12244ce1ceb215f?s=96&d=mm&r=g\",\"caption\":\"Wei Lien Dang\"},\"description\":\"Wei Lien Dang is a senior director for product management at Red Hat\",\"url\":\"https:\/\/sdtimes.com\/author\/weileindang\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The evolution and future of cloud-native security - SD Times","description":"Cloud-native security has changed very quickly and will need to continue to evolve to meet tomorrow's challenges","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/","og_locale":"en_US","og_type":"article","og_title":"The evolution and future of cloud-native security - SD Times","og_description":"Cloud-native security has changed very quickly and will need to continue to evolve to meet tomorrow's challenges","og_url":"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/","og_site_name":"SD Times","article_publisher":"https:\/\/www.facebook.com\/SDTimesD2","article_published_time":"2021-04-30T15:42:58+00:00","article_modified_time":"2021-05-03T13:41:38+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2021\/04\/thunderstorm-3441687_640.jpg","type":"image\/jpeg"}],"author":"Wei Lien Dang","twitter_card":"summary_large_image","twitter_creator":"@sdtimes","twitter_site":"@sdtimes","twitter_misc":{"Written by":"Wei Lien Dang","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/#article","isPartOf":{"@id":"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/"},"author":{"name":"Wei Lien Dang","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/c74b73870eee1dcf19604b757fbf6f63"},"headline":"The evolution and future of cloud-native security","datePublished":"2021-04-30T15:42:58+00:00","dateModified":"2021-05-03T13:41:38+00:00","mainEntityOfPage":{"@id":"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/"},"wordCount":1286,"publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"image":{"@id":"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2021\/04\/thunderstorm-3441687_640.jpg","keywords":["cloud native","containers","Kubernetes","Red Hat","security","stackrox"],"articleSection":["Latest News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/","url":"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/","name":"The evolution and future of cloud-native security - SD Times","isPartOf":{"@id":"https:\/\/sdtimes.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/#primaryimage"},"image":{"@id":"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2021\/04\/thunderstorm-3441687_640.jpg","datePublished":"2021-04-30T15:42:58+00:00","dateModified":"2021-05-03T13:41:38+00:00","description":"Cloud-native security has changed very quickly and will need to continue to evolve to meet tomorrow's challenges","breadcrumb":{"@id":"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/#primaryimage","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2021\/04\/thunderstorm-3441687_640.jpg","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2021\/04\/thunderstorm-3441687_640.jpg","width":640,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/sdtimes.com\/security\/the-evolution-and-future-of-cloud-native-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sdtimes.com\/"},{"@type":"ListItem","position":2,"name":"The evolution and future of cloud-native security"}]},{"@type":"WebSite","@id":"https:\/\/sdtimes.com\/#website","url":"https:\/\/sdtimes.com\/","name":"SD Times","description":"Software Development News","publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sdtimes.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sdtimes.com\/#organization","name":"SD Times","url":"https:\/\/sdtimes.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","width":225,"height":90,"caption":"SD Times"},"image":{"@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SDTimesD2","https:\/\/x.com\/sdtimes","https:\/\/www.linkedin.com\/company\/sdtimes\/"]},{"@type":"Person","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/c74b73870eee1dcf19604b757fbf6f63","name":"Wei Lien Dang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/image\/a8b652316250da08e2db6cbaab487f8f","url":"https:\/\/secure.gravatar.com\/avatar\/7d06749c91526468b12244ce1ceb215f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d06749c91526468b12244ce1ceb215f?s=96&d=mm&r=g","caption":"Wei Lien Dang"},"description":"Wei Lien Dang is a senior director for product management at Red Hat","url":"https:\/\/sdtimes.com\/author\/weileindang\/"}]}},"_links":{"self":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/43831"}],"collection":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/users\/1011"}],"replies":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/comments?post=43831"}],"version-history":[{"count":2,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/43831\/revisions"}],"predecessor-version":[{"id":43859,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/43831\/revisions\/43859"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media\/43833"}],"wp:attachment":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media?parent=43831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/categories?post=43831"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/tags?post=43831"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/coauthors?post=43831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}