Cloud breaches are becoming more sophisticated and attackers are learning about cloud-native tools and services. Real-time monitoring and trusted sources for images are critical for cloud security. Supply chain compromises and blind trust in dependencies are also major concerns.
- Real-time monitoring is critical for detecting malicious activity using secrets
- Malicious images can be planted in public repositories and trusted sources should be used
- DDOS attacks are increasing and containers are being used to crowdsource participation
- Supply chain compromises and blind trust in dependencies can lead to major security issues
- Attackers are becoming more knowledgeable about cloud-native tools and services
- Crypto mining attacks are low effort and high reward, and their scale is expected to increase