Cloud 101CircleEventsBlog
Download Presentations from the CSA AI Summit at RSAC Now

Download Publication

Cloud Native Application Protection Platform Survey Report
Cloud Native Application Protection Platform Survey Report
Who it's for:
  • Cloud security practitioners
  • Cybersecurity professionals

Cloud Native Application Protection Platform Survey Report

Release Date: 08/23/2023

Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to the complexity of comprehensively securing multi-cloud environments. CNAPPs consolidate the capabilities of many security tools, such as Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWP), Cloud Infrastructure Entitlement Management (CIEM), network security, and secure DevOps. 

Microsoft commissioned CSA to develop a survey and report to better understand the industry’s knowledge, attitudes, and opinions regarding CNAPP security. The survey was conducted online in April 2023 and received 1201 responses from IT and security professionals. The report aims to provide insights into organizations’ cloud security priorities and challenges, reveal the current state of CNAPP deployment, and identify current methods for and challenges in security posture management, cloud workload protection, and DevSecOps.

Key Takeaways:
  • 3 out of 4 organizations use CNAPP to protect their multi-cloud environment.
  • 32% of organizations are struggling with prioritizing security improvements due to the overwhelming and often incorrect information they receive from alerts.
  • 51% of organizations are in the process of integrating security into their DevOps practices, with only 35% reporting complete integration.
  • Network security, out of all the categories, was most mature, with 43% of organizations reporting full integration in a multi-cloud environment for network security, compared to just 28% for CSPM. 
  • Just under half (43%) of organizations identified misconfiguration of permissions as their top concern with cloud permissions in a multi-cloud environment.
Download this Resource

Bookmark
Share
Related resources

Sponsor

HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
Resource Constraints in Kubernetes and Security
Resource Constraints in Kubernetes and Security
Published: 05/06/2024
Business Risks Explored: Practical Insights for Resilience
Business Risks Explored: Practical Insights for Resilience
Published: 05/03/2024
Livin' on the Edge: Linux's Impact on Computing
Livin' on the Edge: Linux's Impact on Computing
Published: 05/01/2024
Navigating the Cloud – Beyond “Best Practices”
Navigating the Cloud – Beyond “Best Practices”
Published: 05/01/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training