Securing Your Workload Mesh
Ed Amoroso summarizes a recent technical conversation with K2 Cyber Security on securing distributed cloud-hosted workloads.

Securing Your Workload Mesh

Andrew Carnegie said this: The way to become rich is to put all your eggs in one basket and then watch that basket. While this quip from the industrialist might have been useful folksy advice for Grandma and Grandpa, it is terrible guidance for the modern computing and application system designer. A much better mental image in computer science today involves distribution – and the correct unit for scattered computation is the workload.

When done right, modern workload implementation involves a carefully woven mesh of applications, systems, databases, and other computational structures, supported across a heterogeneous infrastructure. The optimal strategy is to first decouple workloads from their underlying host environments, and to then scatter the workloads across a cloud ecosystem. The resulting advantages range from increased resilience to improved performance.

The big challenge, however – and there’s always some-darn-thing complicating new designs in computing – is that security becomes a bit of a puzzle. That is, where we could previously code rules into an access management system tightly coupled to the application inside a next-generation firewall, we no longer have that perimeter luxury when designers scatter their workloads all over tarnation. Securing a blob sure seems easier than securing a mesh.

I spent some stimulating discussion time on this topic last week with Pravin Madhani, founder of K2 Cyber Security. Madhani is an impressive entrepreneur, but he also has serious chops in technology, with degrees from IIT and UT Austin, as well as years of experience in many technical and engineering roles. K2 is one of his more ambitious technical efforts, and he was kind enough to share his vision. Here is what I learned:

“Workloads used to be hosted on-premise, inside a perimeter,” he explained. “But now, everyone knows that they are hosted in the cloud. And this poses obvious cyber security challenges, not just in the architectural sense, but also in how applications execute. Establishing a dynamic understanding of how an application interacts with its environment is a key aspect in providing proper cyber protection.”

K2 is focused on two aspects of the security problem for cloud-hosted workloads: First, it offers a protective solution for workloads called K2 Prevent, that builds a dynamic execution map of application behavior. “Our map is built very quickly at run-time,” Madhani said, “and it allows us to compare live execution with a profile of normal expected behavior just from the binaries. Unlike in RASP, we don’t need access to source code.”

The second element of the K2 solution is an architectural control called K2 Segment that supports workload distribution across a heterogeneous cloud ecosystem. Workloads are identified by assigned cryptographic identities, and policies are enforced for virtual machines, containers, pods, and other hosting structures, without reliance on a perimeter. The platform orchestrates a common set of policies – and this is required for modern cloud.

Madhani took me through several use-case examples, and they were impressive. He showed me a case involving a vulnerable module in NGINX (pronounced Engine-X, by the way). The K2 execution map was apparently instrumental in identifying the errant behavior through observed differences with live run-time behavior. He also showed me a case study where common labels were enforced across Kubernetes pods. It all sounded quite nice.

The success of a security start-ups is driven by many factors, including the passion of its founders. An additional factor that always seems to be present, however, is a clear technical vision compatible with the reality of evolving customer environments. I can report with great confidence that Pravin Madhani has the correct vision: Cloud hosted workloads will need behavioral controls, and they will need distributed policy orchestration. Period.

So, I think this is likely a successful run for K2, especially as more companies host applications across heterogeneous cloud operating environments. Having the security travel along with the workloads seems such a good idea that it’s hard not to see growth here. I suspect K2 Prevent will be easier to sell in the near term than K2 Segment – but I shared with Madhani my view that the segmentation will have more impact in the long run.

You should consider connecting with Madhani and his team at K2 Cyber Security. And make sure to wear your thinking cap, because his team deals with complex technology. It does require some serious concentration to keep up: Welcome to high tech cyber security. But in the end, the time will be well-spent and you’ll be glad that you started planning for commonality in the security and policy enforcement of your workloads across cloud.

As always, please share what you learn.


Don’t put all of your security eggs in one basket!

要查看或添加评论,请登录

Edward Amoroso的更多文章

  • Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    As you no doubt have heard, plans are in place to establish a Strategic Bitcoin Reserve and Digital Asset Stockpile…

    13 条评论
  • Parable of Network Observability

    Parable of Network Observability

    I’d like to discuss here a common problem we see in our work at TAG every day – namely, the deployment of “network…

    23 条评论
  • Parable of the Cyber Industrial Complex

    Parable of the Cyber Industrial Complex

    Preamble In 1961, Eisenhower gave a famous speech that warned of the dangers of the so-called military-industrial…

    34 条评论
  • The Challenges of CISOs Working for Cybersecurity Vendors

    The Challenges of CISOs Working for Cybersecurity Vendors

    (Note to Reader: Normally these reports are available only to TAG Research as a Service (RaaS) subscribers. But with…

    27 条评论
  • Have Uncle Joe Read This Before He Invests in Crypto

    Have Uncle Joe Read This Before He Invests in Crypto

    I’ve been lecturing to my graduate students on the foundations of cryptocurrency and blockchain for years. Starting…

    15 条评论
  • Why TAG is Now Rating Cybersecurity Vendors

    Why TAG is Now Rating Cybersecurity Vendors

    by Edward Amoroso The first time I ever paid attention to an analyst quadrant – fully two decades ago, I found myself…

    11 条评论
  • Predicting the Impact of Trump’s Election on Cyber

    Predicting the Impact of Trump’s Election on Cyber

    Below are seven predictions from our team at TAG for how the recent Trump election of 2024 will impact U.S.

    83 条评论
  • Five Tips for Working CISOs

    Five Tips for Working CISOs

    Our team at TAG has been coaching CISOs for years – and this includes private discussions just about every day of every…

    11 条评论
  • The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    Preface During May and June of 2024, draft versions of this article were shared with Chief Information Security…

    123 条评论
  • Sad Loss Today

    Sad Loss Today

    Several years ago, before the Pandemic, I received a friendly call from a law firm I’d done some business with – and…

    9 条评论

社区洞察

其他会员也浏览了