Every App Will Be Vulnerable. Security Needs to Be Automated Inside and Outside the App.
Published 06/06/2022
This blog was originally published by Valtix here.
Written by Vishal Jain, Co-Founder and CTO of Valtix.
Recent vulnerabilities and customer conversations have made a few things crystal clear in the last few months:
- There is no such thing as an invulnerable app, so inline defenses protecting the app are a must (yes, even in the cloud).
- All defenses must be automated in the cloud – discover apps, deploy defenses, and enforce policy. Or defenses will be bypassed – remember that the developers are in charge.
Our recent research report on how Log4shell has changed cloud security further supports the impact of these types of vulnerabilities and highlights some key understandings among enterprises.
- 95% said log4j was a wake-up call for cloud security
- 82% said log4j vulnerability changed their priorities
- 77% still dealing with Log4j patching
In other words, these vulnerabilities are universal, there will be more of them, and each will have a long tail. You can see the research report here.
Back to my original key points – there will always be vulnerabilities in software. The difference is that with open source software, a single supply chain vulnerability applies to multiple applications (thousands), and so attackers will work harder to find and exploit them. On the positive side – developers are in charge (good for business), moving rapidly, and in many cases, motivated to fix security issues, e.g., shifting left.
Despite these positives, there are still two things that folks are concerned about:
- There is always going to be a window of vulnerability. It might be 6 hours, 6 days, 6 weeks, or 6 months – depending on how big the issue is, how much control the org has, and how good they are at exercising that control. During that window, security people will not sleep.
- Sometimes “patching” is worse. Or simple app configuration errors.
Therefore, defenses that protect the app from outside the app (network-based, agent-based, firewalls, IPS, WAF, DLP, etc), will always be necessary. The issue here is that previous implementations of those controls (hardware appliances in the data center, virtual appliances in the cloud), aren’t up to cloud pace. They’re not natively automated to discover apps, deploy defenses, and enforce policy.
In the cloud world, anything that can’t keep pace with cloud deployment gets routed around by developers on behalf of the business. In other words: we need defenses inside and outside the app, and those defenses must be automated.
Unlock Cloud Security Insights
Subscribe to our newsletter for the latest expert trends and updates
Related Articles:
Why We’re Launching a Trusted AI Safety Knowledge Certification Program
Published: 04/26/2025
Phishing Tests: What Your Provider Should Be Telling You
Published: 04/24/2025
Virtual Patching: How to Protect VMware ESXi from Zero-Day Exploits
Published: 04/21/2025
AI Red Teaming: Insights from the Front Lines of GenAI Security
Published: 04/21/2025