Accoxs, the start of the Code-To-Cloud that jumped from last month's stealth mode shows how to include safety in the Devops and Ramagine Cloud Posture.
As cyber security attacks and violation of the current environment continue, safe coding has become an integral part of the risk of violations through applications. In the midst of the ongoing shift towards creating a cloud infrastructure through the code (IC), the accuracy, and the start of the code to the cloud that came out of the hiding mode in April has put forward critical cloud security practices and trends through organizations to delve into the state of Devsecops.
The state of the report from Devsecops by Accurics emphasizes the importance of ensuring safety in the Devops life cycle and protecting the full cloudy cloud stack, including maids, containers, infrastructure, implementing technical political studies and security assessments through infrastructure as a symbol. Here is the comma: 90 & Percnt; From the institutions, it allows distinguished users to make training changes directly on the cloud infrastructure after their publication. Startup is blocked while the cloud position is drifted from the safe foundation line that was created during development. In addition, only 4 & Percnt; One of the issues mentioned in production is already addressed.
Shedding light on the cloud weaknesses of safety, PIIUUUUHHRRMA, co -founder and CTO, accuracy, exclusively shared with Toolbox, “many years in the cloud era, why does security still lack greatly?
Technology News: Accurricks raises the winding from a safety solution to the cloud
He also added, “The adoption of the infrastructure, as the code creates an opportunity for institutions to apply for cloud violations as long as best practices and security assessments are made on the symbol. Unfortunately, this is not the case today and we will continue to see the cloud violations until they are addressed.”
Increase security risks
The emergence of new technologies such as servers, containers, and the server network, the companies that integrate them into their cloud and increased opportunities for violations and cloud attacks. CNCf CNCF
It indicates, 84 & Percnt; From organizations use containers in production and 41 & Percnt; From companies use the server. The report proposes a comprehensive strategy to protect all stacks.Technology News: Fortanix reveals the Saas Plastic Computing Conditions platform
Best practices for cloud infrastructure security:
To secure the IAC and Black Environment, Accurics submits the following recommendation:
1.
2. Security to the cloud: It is one of the best practices to include safety early in the life cycle of development before providing the code and then monitoring risks throughout the life cycle
3. Preventing the drawing of the cloud position: preserving the cloud safety position by providing the safe foundation line that was created through the code and to remove the drifting the cloud position.
The benefits of infrastructure as a complex symbol – institutions also have the opportunity to redesign their cloud security strategy and stay away from a point solution approach. Not only that, IAC safety will also prevent discrimination, political violations, and enhance developers' productivity.
Tell us if you love this news on LinkedIn
Twitter Or Facebook . We would like to hear from you!