{"id":4676,"date":"2020-12-03T13:19:54","date_gmt":"2020-12-03T05:19:54","guid":{"rendered":"http:\/\/www.cloudfall.cn\/?page_id=4676"},"modified":"2022-12-28T11:30:37","modified_gmt":"2022-12-28T03:30:37","slug":"%e5%ae%b9%e5%99%a8%e5%ae%89%e5%85%a8%e6%89%98%e7%ae%a1mds","status":"publish","type":"page","link":"https:\/\/www.cloudfall.cn\/en\/?page_id=4676","title":{"rendered":"Managed Cloud Native Security MCNS"},"content":{"rendered":"\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">Cloud Native Security Issues<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">In recent years, as cloud-native technology is becoming more and more popular, cloud-native security is also gaining widespread attention and importance. The security of cloud-native environment infrastructure, container image security, workload operation security, and the security of the entire cloud-native ecology are issues that need to be addressed.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"1304\" height=\"1446\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/WX20220515-200855@2x.png\" alt=\"\" class=\"wp-image-5969\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220515-200855@2x.png 1304w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220515-200855@2x-768x852.png 768w\" sizes=\"(max-width: 1304px) 100vw, 1304px\" \/><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<ul style=\"font-style:normal;font-weight:300\"><li>Large number of unprotected exposed containers\/Pods<\/li><li>Potential security risks due to incorrect cluster security settings<\/li><li>New fileless attacks, escapes to static security checks<\/li><li>Container escapes due to container engine vulnerabilities<\/li><li>Blurred container east-west boundaries and lack of isolation means<\/li><li>Massive non-compliant use of &#8220;rich&#8221; containers<\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\" style=\"font-style:normal;font-weight:300\">Managed Cloud Native Security<\/h3>\n\n\n\n<p>Cloudfall MCNS service provides comprehensive security hosting for enterprise cloud-native environments. We focus on the security of the complete DevOps lifecycle, including development, build, infrastructure and operation phases, and use leading international cloud-native security management tools to help users improve security in the DevOps process.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/WX20220515-203936@2x.png\" alt=\"\" class=\"wp-image-5995\" width=\"283\" height=\"281\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220515-203936@2x.png 1482w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220515-203936@2x-150x150.png 150w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220515-203936@2x-768x763.png 768w\" sizes=\"(max-width: 283px) 100vw, 283px\" \/><\/figure><\/div>\n\n\n<p>Cloudfall MCNS service supports containers, K8s system detection and assessment, CI\/CD, compliance, operational state detection and more, and helps set security compliance baselines and best practice see standards to secure enterprise compliance. Meanwhile, thanks to the access to IX platform and real-time monitoring and analysis by 7X24 security operations team, in-depth analysis of continuous cloud-native environment security can be performed.<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\"> <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"2482\" height=\"824\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/WX20220515-201703@2x.png\" alt=\"\" class=\"wp-image-5978\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220515-201703@2x.png 2482w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220515-201703@2x-1500x498.png 1500w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220515-201703@2x-768x255.png 768w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220515-201703@2x-1536x510.png 1536w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220515-201703@2x-2048x680.png 2048w\" sizes=\"(max-width: 2482px) 100vw, 2482px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">Protect the Build<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">With tools for security &#8220;left shifting&#8221; (moving checks and verifications early in the development cycle), security testing during the development phase provides users with quick feedback on code and configurations that may be checked later, either manually or automatically, and can reduce the friction of introducing more secure practices.<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">During the build phase, Cloudfall Container Security Services provides capabilities such as unknown threat detection, vulnerability shadow line assessment, CI\/CD integration, etc. We help users prioritize all scanned vulnerabilities and give them a risk score from CVE, a risk score based on the nature of the vulnerability and how the application is deployed and running, adjusting the priority based on the customer&#8217;s specific environment and focusing on remediation for the most important risks.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-6 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/AquaPtB.png\" alt=\"\" class=\"wp-image-5979\" width=\"400\" height=\"214\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/AquaPtB.png 1218w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/AquaPtB-768x412.png 768w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><figcaption>Unknown Threat Detection<\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"1200\" height=\"658\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/aquaPtB2.png\" alt=\"\" class=\"wp-image-5980\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/aquaPtB2.png 1200w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/aquaPtB2-768x421.png 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><figcaption>Vulnerability Impact Assessment<\/figcaption><\/figure>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">Protect the Infrastructure<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">In infrastructure protection, we provide comprehensive compliance management capabilities, Kuberntes cluster risk, KSPM configuration audit, host vulnerability risk, and other capabilities; and through our real-time monitoring platform and service monitoring and management baselines, we identify and alert risks in a timely manner, and help users analyze and improve.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">Scanning, monitoring and remediating configuration issues in public cloud accounts across AWS, Azure and other public clouds based on best practices and compliance standards, and implementing compliance controls for PCI, HIPAA, GDPR, etc. across the cloud-native application lifecycle.\uff1b<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\"><br>Control the complexity of Kubernetes security with KSPM (Kubernetes Security State Management) and advanced Kubernetes runtime protection. Leverage Kubernetes native capabilities to achieve policy-driven, full lifecycle protection and compliance for your K8s applications<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-9 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/aquaPtB3.png\" alt=\"\" class=\"wp-image-5983\" width=\"368\" height=\"299\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/aquaPtB3.png 826w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/aquaPtB3-768x625.png 768w\" sizes=\"(max-width: 368px) 100vw, 368px\" \/><figcaption>Compliance Management<\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/aquaPtB4.png\" alt=\"\" class=\"wp-image-5984\" width=\"481\" height=\"241\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/aquaPtB4.png 1300w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/aquaPtB4-768x385.png 768w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><figcaption>K8s Security<\/figcaption><\/figure>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">Protect the Workload<\/p>\n\n\n\n<p>The Cloud Workload Protection Platform (CWPP) is now part of the emerging Cloud Native Application Protection Platform (CNAPP) category, designed to protect different types of cloud workloads &#8211; such as virtual machines, containers, and serverless functions &#8211; deployed in public, hybrid, or multi-cloud environments. Cloudfall uses the industry&#8217;s most advanced container security solutions to protect container-based cloud-native applications from development to production, helping users build secure workload environments with technologies and services such as CI scanning, dynamic analysis, risk identification, vulnerability protection, runtime policies, behavioral profiles, workload firewalls, auditing and forensics, and more.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-12 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/aquaPtB5.png\" alt=\"\" class=\"wp-image-5987\" width=\"311\" height=\"262\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/aquaPtB5.png 794w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/aquaPtB5-768x648.png 768w\" sizes=\"(max-width: 311px) 100vw, 311px\" \/><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/aquaPtB6.png\" alt=\"\" class=\"wp-image-5988\" width=\"474\" height=\"263\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/aquaPtB6.png 1196w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/aquaPtB6-768x428.png 768w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/><\/figure><\/div><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p> <\/p>\n\n\n\n<p>Cloudfall security team can help customers establish and monitor proper access control measures, while providing enterprise-class file integrity monitoring, host auditing and log analysis capabilities that can centrally monitor sensitive events in containers (e.g. sshd, sudo, etc.) and present and analyze them in real-time via the IX platform. At the same time, we can integrate native plug-ins and scanners into any CI\/CD tool or workflow to provide vulnerability and compliance scanning results directly to developers.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/WX20220515-201754@2x.png\" alt=\"\" class=\"wp-image-5990\" width=\"759\" height=\"754\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220515-201754@2x.png 1484w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220515-201754@2x-150x150.png 150w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220515-201754@2x-768x764.png 768w\" sizes=\"(max-width: 759px) 100vw, 759px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Cloud Native Security Issues In recent years, as cloud- [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/4676"}],"collection":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4676"}],"version-history":[{"count":42,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/4676\/revisions"}],"predecessor-version":[{"id":6592,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/4676\/revisions\/6592"}],"wp:attachment":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}