Cloud 101CircleEventsBlog

Download Publication

Cloud Native Application Protection Platform Survey Report
Cloud Native Application Protection Platform Survey Report
Who it's for:
  • Cloud security practitioners
  • Cybersecurity professionals

Cloud Native Application Protection Platform Survey Report

Release Date: 08/23/2023

Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to the complexity of comprehensively securing multi-cloud environments. CNAPPs consolidate the capabilities of many security tools, such as Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWP), Cloud Infrastructure Entitlement Management (CIEM), network security, and secure DevOps. 

Microsoft commissioned CSA to develop a survey and report to better understand the industry’s knowledge, attitudes, and opinions regarding CNAPP security. The survey was conducted online in April 2023 and received 1201 responses from IT and security professionals. The report aims to provide insights into organizations’ cloud security priorities and challenges, reveal the current state of CNAPP deployment, and identify current methods for and challenges in security posture management, cloud workload protection, and DevSecOps.

Key Takeaways:
  • 3 out of 4 organizations use CNAPP to protect their multi-cloud environment.
  • 32% of organizations are struggling with prioritizing security improvements due to the overwhelming and often incorrect information they receive from alerts.
  • 51% of organizations are in the process of integrating security into their DevOps practices, with only 35% reporting complete integration.
  • Network security, out of all the categories, was most mature, with 43% of organizations reporting full integration in a multi-cloud environment for network security, compared to just 28% for CSPM. 
  • Just under half (43%) of organizations identified misconfiguration of permissions as their top concern with cloud permissions in a multi-cloud environment.
Download this Resource

Bookmark
Share
Related resources

Sponsor

The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action
The Six Pillars of DevSecOps: Measure, Monitor,...
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Apple's New iMessage, Signal, and Post-Quantum Cryptography
Apple's New iMessage, Signal, and Post-Quantum Cryptography
Published: 05/17/2024
2024 State of SaaS Security Report Shows A Gap Between Security Team Confidence And Complexity of SaaS Risks
2024 State of SaaS Security Report Shows A Gap Between Security Tea...
Published: 05/16/2024
Navigating Cloud Security Best Practices: A Strategic Guide
Navigating Cloud Security Best Practices: A Strategic Guide
Published: 05/15/2024
How to Design an IT Service Model for End User Happiness
How to Design an IT Service Model for End User Happiness
Published: 05/15/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training