{"id":113403,"date":"2020-07-14T06:00:34","date_gmt":"2020-07-14T13:00:34","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=113403"},"modified":"2020-07-16T12:06:36","modified_gmt":"2020-07-16T19:06:36","slug":"cloud-defenders-adventure","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/07\/cloud-defenders-adventure\/","title":{"rendered":"Join the Adventures of the Cloud Defenders"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">We are the Cloud Defenders. You may have heard of us if you\u2019ve ever journeyed to the land of cloud native security \u2013 that\u2019s where we live. Perhaps you\u2019ve seen our fortress floating by from your own datacenter castle or marveled at our secure container ship on the Kubernetes Sea.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since we pledged our fealty to the realm of cloud, many things have changed. Our developers are now able to move at previously unfathomable speeds. Their new architectures are robust, sparkling with splendor. However, our security and compliance brigades are in turmoil.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our perimeter has become shrouded by a mysterious fog of ephemeral cloud resources, nearly undetectable by our security tools. Each tool was crafted for a special purpose, but none is equipped to vanquish the full scope of threats our kingdom faces. There is no way for us to take asset inventory or understand the scope of our risk when the fog is constantly changing like a shadow. Our developers sprint quickly forward, discovering stunning new possibilities, but often outpacing our security and compliance armies as they push the perimeter ever outward.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">No matter how triumphant our applications, our kingdom will surely collapse on itself if we cannot unite our scattered cloud defenders into a secure army.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Our Mission: An Empire United by CNSP<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">King CISO has called upon us to unite our security functions under one flag. Our mission is to clarify our borders and offer continuous protection without stifling agility, integrating all our security functions under one <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/12\/cloud-native-security-platform-age\/\"><span style=\"font-weight: 400;\">cloud native security platform<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><span style=\"font-weight: 400;\">Let us introduce ourselves, one by one:<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4>SecOps<\/h4>\n<p><span style=\"font-weight: 400;\">I investigate and report on security risks within our company. Ever since we began our voyage through the cloud, I have been consumed by security alerts that attack me like screeching bats. Relentlessly, they shriek and squawk, thousands of them begging for my immediate attention \u2013 but they are disparate, leaving me with no context which might help me prioritize them. I know there must be a way to bring order to this chaos and automatically prioritize alerts based on holistic security awareness. I just need to find out how.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4>Audit and Compliance<\/h4>\n<p><span style=\"font-weight: 400;\">I\u2019m responsible for maintaining compliance across all our clouds. As I traverse our mountain of cloud storage, taking asset inventory, I discover what seems to be an ever-changing landscape. Workloads and resources seem to appear at random \u2013 running, I try to map them to compliance policies. But I simply can\u2019t keep up, and my current tools don\u2019t scale to address the cloud. There has to be a way to continuously discover assets and monitor compliance in realtime. We just need to figure it out.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4>DevOps<\/h4>\n<p><span style=\"font-weight: 400;\">The cloud has opened up a whole new world for me \u2013 and introduced new risks. I used to walk for months to the waterfall and back in order to push out new features, but now I can sprint through the Agile Trail, sprinkling bits of code into the CI\/CD pipeline, producing new features as quickly as I can. However, I face what feels like a multi-headed hydra of demands. I\u2019m moving so fast that the security team cannot always track me, but I can\u2019t slow down when we\u2019ve got customers to please and I\u2019ve got KPIs to hit. There has to be a way to integrate security throughout the entire <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/05\/cloud-secure-cloud-native-applications\/\"><span style=\"font-weight: 400;\">development lifecycle<\/span><\/a><span style=\"font-weight: 400;\">. We just need to figure out how.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4>NetSec<\/h4>\n<p><span style=\"font-weight: 400;\">I oversee the collective security of the network and, now, the cloud. This new cloud realm presents one of the biggest challenges I\u2019ve ever encountered. Sometimes I find myself traveling through an obscure storm of security breaches, manually configuring security groups as I discover them. But this is not sustainable. This storm appears to stretch far beyond the horizon, and the developers won\u2019t slow down and wait for me. There has to be a better way.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Join Our Campaign\u00a0<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">We are the Cloud Defenders. We are everyday heroes facing the challenges of this uncharted terrain in pursuit of growth and technological advancement \u2013 but we need the right tools to accomplish this quest.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Explore our full story in<\/span><a href=\"http:\/\/start.paloaltonetworks.com\/adventures-of-cloud-defenders\"><span style=\"font-weight: 400;\"> this interactive experience<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cloud defenders are on a quest to secure the realm \u2013 are you prepared to join as they battle for cloud native security?<\/p>\n","protected":false},"author":663,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768],"tags":[6901,4378,6890],"coauthors":[7059],"class_list":["post-113403","post","type-post","status-publish","format-standard","hentry","category-secure-the-cloud","tag-cloud-native-security-platform","tag-google-cloud","tag-prisma-cloud"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/113403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=113403"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/113403\/revisions"}],"predecessor-version":[{"id":113405,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/113403\/revisions\/113405"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=113403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=113403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=113403"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=113403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}