{"id":81298,"date":"2024-01-08T13:03:00","date_gmt":"2024-01-08T13:03:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81298"},"modified":"2026-02-25T05:32:34","modified_gmt":"2026-02-25T05:32:34","slug":"fortifying-cloud-native-security","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/","title":{"rendered":"Fortifying Cloud-Native Environments: Experts Insights on the Evolution of Cloud Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81298\" class=\"elementor elementor-81298\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b1c38d6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b1c38d6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-89b7216\" data-id=\"89b7216\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8ad42f0 elementor-widget elementor-widget-heading\" data-id=\"8ad42f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"> Fortifying Cloud-Native Environments: Expert Insights on the Evolution of Cloud Security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-168610c elementor-widget elementor-widget-text-editor\" data-id=\"168610c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In today&#8217;s rapidly evolving IT landscape, one concept stands out as a game-changer: cloud-native computing. As organizations transition from traditional on-premises infrastructure to cloud-based solutions, they are altering where their data and applications reside and how they are built, deployed, and secured in this ever-shifting digital terrain. To understand the knowledge of a holistic approach to cloud-native security, we interviewed Priyanka Kulkarni Joshi, a past Researcher and a craver to be a CISO and Cybersecurity Specialist at UBS, specializing in online security research, planning, execution, and maintenance.<\/p>\n<p>Priyanka is also an expert in audits and risk management, ethical hacking, and compliance and has previously managed various freelance security projects. She has excellent managerial skills and an impressive track record in the IT security industry and was nominated as the 2020 Cyber Spartans Award winner. Through her experience in <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-cloud-security-engineer-course\/\">cloud security<\/a>, she delves deep into the transformative power of cloud-native environments and, more crucially, security&#8217;s pivotal role in this shift. The article also explores the fundamental challenges and best practices and provides insights into safeguarding your cloud-native infrastructure.<\/p>\n<h2>What is the significance of cloud-native security in modern IT environments?<\/h2>\n<p>The significance of cloud-native security in the modern IT environment lies in customizing security capabilities for cloud platforms. Implementing cloud-native security is crucial for safeguarding companies against potential threats and unauthorized access to their data stored in the cloud. This includes sensitive business content related to client orders, designs, requirements, financial information, etc. Additionally, this measure aids in averting data leaks and the theft of sensitive information. Safeguarding data is paramount for upholding the trust of your customers and securing the assets that underpin your competitive edge.<\/p>\n<h2>What common security challenges are specific to cloud-native applications and infrastructure?<\/h2>\n<p>Some of the most common challenges in security implementation cloud be listed as:<\/p>\n<ol>\n<li>Cost of security resources<\/li>\n<li>Lack of visibility in a distributed system<\/li>\n<li>Reliability issues<\/li>\n<li>Keeping up to date with outdated technologies<\/li>\n<li>Monitoring microservices.<\/li>\n<li>Ability to filter important metrics from the pool of metrics<\/li>\n<li>Identifying the right tools or platforms.<\/li>\n<li>Security and compliance<\/li>\n<li>Lack of technical expertise<\/li>\n<\/ol>\n<h2>Can you help us understand the shared responsibility model from the perspective of containerized application security?<\/h2>\n<p>The shared responsibility model in containerized applications is a security and compliance framework that portrays the obligations of cloud service providers and container security stakeholders. It is a critical part of a comprehensive security assessment, which protects the application from potential risk and uses a combination of security tools and policies. As the definition simplifies, this model is responsible for every aspect of the cloud environment where the data security in the cloud encryption of data at rest and data in transit and group configuration would be saved when applied to the containerized applications in use.<\/p>\n<h2>What are the best practices for securing serverless applications in a cloud-native architecture?<\/h2>\n<p>The best practice to ensure serverless security involves securely storing sensitive data (such as credentials, PII, SSN, etc.) in protected databases. Further security enhancement can be achieved by managing and restricting access, ensuring a secure and limited accessibility framework.<\/p>\n<p>Some best practices can be practiced as follows:<\/p>\n<ul>\n<li>Minimize the function roles<\/li>\n<li>Monitor the log functions<\/li>\n<li>Employ API gateways<\/li>\n<li>Scan always for a bad code (review each before it&#8217;s out)<\/li>\n<li>Perimeter security should be tough, and the function levels as well.<\/li>\n<\/ul>\n<p>By upholding this practice, we can assign specific privileges to individual functions, ensuring that these privileges are confined to the narrowest scope required. This approach enhances perimeter security and mitigates potential attacks&#8217; impact.<\/p>\n<h2>How can you ensure the security of microservices and APIs in a cloud-native ecosystem?<\/h2>\n<p>Ensuring the security of microservices and APIs in a cloud-native ecosystem is a huge task, and both APIs and microservices play a key role in cloud-native environments; microservices serve as the cornerstone of distributed and shared computing resources. Conversely, APIs are a very efficient way to streamline the operations and development tasks with the operational team and ensure that the services used each time are properly isolated from the other tasks.<\/p>\n<p>There are a few ways that we can secure the microservices architecture:<\/p>\n<ul>\n<li>Use HTTPS<\/li>\n<li>Scan for any dependencies<\/li>\n<li>Mitigate loopholes<\/li>\n<li>Cover security bases<\/li>\n<li>Use access and identity tokens<\/li>\n<li>Know, the cloud and cluster securities<\/li>\n<li>TLS security and secret management<\/li>\n<li>Extended authentication needs to be managed.<\/li>\n<li>Access logging<\/li>\n<\/ul>\n<h2>What, according to you, are the key components and considerations to achieve a comprehensive cloud-native security strategy?<\/h2>\n<p>Some of the key components for a comprehensive cloud-native security can be listed as:<\/p>\n<ul>\n<li>Data protection<\/li>\n<li>Incident response<\/li>\n<li>Detection controls<\/li>\n<li>Access management<\/li>\n<li>Encryption management<\/li>\n<\/ul>\n<h2>What do you best suggest for responding to a security breach or incident in a cloud-native environment?<\/h2>\n<p>Responding to a security breach or incident in a cloud-native environment should be like the cyber incident response. In contrast, a cloud-native attack breach frequently follows a typical progression of a legitimate user account compromise, account reconnaissance, privilege escalation, resource exploitation, data exfiltration, and credentials. The <a href=\"https:\/\/www.eccouncil.org\/cybersecurity\/what-is-cloud-security\/\">cloud incident response<\/a> is similar to traditional incident response regarding planning, procedures, and controls that facilitate incident detection and response action. However, as cloud deployment involves a shared responsibility model, having a little knowledge about cloud deployment incident preparation key and the incident strategy would ensure an effective response to the security incidents, which will help businesses effectively navigate IT disruption.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5638216 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5638216\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4f79880\" data-id=\"4f79880\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d719ef9 tags-cloud elementor-widget elementor-widget-heading\" data-id=\"d719ef9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tags<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05789b3 tags-cloud elementor-widget elementor-widget-post-info\" data-id=\"05789b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-f2e3860 elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/cloud\/\" class=\"elementor-post-info__terms-list-item\">Cloud<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/cloud-security\/\" class=\"elementor-post-info__terms-list-item\">Cloud Security<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/cybersecurity\/\" class=\"elementor-post-info__terms-list-item\">cybersecurity<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/data-protection\/\" class=\"elementor-post-info__terms-list-item\">Data Protection<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/ec-council\/\" class=\"elementor-post-info__terms-list-item\">EC-Council<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/information-security\/\" class=\"elementor-post-info__terms-list-item\">Information Security<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-379ad1c tags-cloud elementor-widget elementor-widget-heading\" data-id=\"379ad1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About the Author<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-36f5560 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"36f5560\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-05113a0\" data-id=\"05113a0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-653b56a elementor-widget elementor-widget-image\" data-id=\"653b56a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"251\" height=\"260\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/Priyanka-Kulkarni-Joshi.png\" class=\"attachment-full size-full wp-image-78775\" alt=\"Priyanka-Kulkarni-Joshi.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6db3021 elementor-widget elementor-widget-heading\" data-id=\"6db3021\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Priyanka Kulkarni Joshi<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fe817f elementor-widget elementor-widget-heading\" data-id=\"3fe817f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CISO\/Cyber Security Specialist, UBS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5d62ed5\" data-id=\"5d62ed5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-324052a elementor-widget elementor-widget-text-editor\" data-id=\"324052a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tPriyanka Kulkarni Joshi has pursued CISO knowledge and is a cybersecurity specialist specializing in online security research, planning, execution, and maintenance. She is an expert in audits, risk management, and compliance and has previously managed various freelance security projects. Priyanka has excellent managerial skills and an impressive track record in the IT security industry and was the winner of the 2020 Cyber Spartans Awards.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Fortifying Cloud-Native Environments: Expert Insights on the Evolution of Cloud Security In today&#8217;s rapidly evolving IT landscape, one concept stands out as a game-changer: cloud-native computing. As organizations transition from traditional on-premises infrastructure to cloud-based solutions, they are altering where their data and applications reside and how they are built, deployed, and secured in this&hellip;<\/p>\n","protected":false},"author":43,"featured_media":81304,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12444],"tags":[354,12399,199,12513,115,12407],"class_list":{"0":"post-81298","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-interview","8":"tag-cloud","9":"tag-cloud-security","10":"tag-cybersecurity","11":"tag-data-protection","12":"tag-ec-council","13":"tag-information-security"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fortifying Cloud-Native Security: Evolution of Cloud Security<\/title>\n<meta name=\"description\" content=\"The interview explores the fundamental changes and challenges, share best practices, and provide insights into safeguarding your cloud-native infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fortifying Cloud-Native Security: Evolution of Cloud Security\" \/>\n<meta property=\"og:description\" content=\"The interview explores the fundamental changes and challenges, share best practices, and provide insights into safeguarding your cloud-native infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-08T13:03:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-25T05:32:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/Fortifying-Cloud-Native-Environments-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Priyanka Kulkarni Joshi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Fortifying Cloud-Native Security: Evolution of Cloud Security\" \/>\n<meta name=\"twitter:description\" content=\"The interview explores the fundamental changes and challenges, share best practices, and provide insights into safeguarding your cloud-native infrastructure.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/Fortifying-Cloud-Native-Environments-feature.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Priyanka Kulkarni Joshi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/fortifying-cloud-native-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/fortifying-cloud-native-security\\\/\"},\"author\":{\"name\":\"Priyanka Kulkarni Joshi\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/3e736e6e709f0b46d31c824f2de5a56d\"},\"headline\":\"Fortifying Cloud-Native Environments: Experts Insights on the Evolution of Cloud Security\",\"datePublished\":\"2024-01-08T13:03:00+00:00\",\"dateModified\":\"2026-02-25T05:32:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/fortifying-cloud-native-security\\\/\"},\"wordCount\":978,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/fortifying-cloud-native-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Fortifying-Cloud-Native-Environments-thumb.jpg\",\"keywords\":[\"Cloud\",\"Cloud Security\",\"cybersecurity\",\"Data Protection\",\"EC-Council\",\"Information Security\"],\"articleSection\":[\"Interview\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/fortifying-cloud-native-security\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/fortifying-cloud-native-security\\\/\",\"name\":\"Fortifying Cloud-Native Security: Evolution of Cloud Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/fortifying-cloud-native-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/fortifying-cloud-native-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Fortifying-Cloud-Native-Environments-thumb.jpg\",\"datePublished\":\"2024-01-08T13:03:00+00:00\",\"dateModified\":\"2026-02-25T05:32:34+00:00\",\"description\":\"The interview explores the fundamental changes and challenges, share best practices, and provide insights into safeguarding your cloud-native infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/fortifying-cloud-native-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/fortifying-cloud-native-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/fortifying-cloud-native-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Fortifying-Cloud-Native-Environments-thumb.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Fortifying-Cloud-Native-Environments-thumb.jpg\",\"width\":521,\"height\":521,\"caption\":\"Fortifying Cloud-Native Environments\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/fortifying-cloud-native-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Interview\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/interview\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Fortifying Cloud-Native Environments: Experts Insights on the Evolution of Cloud Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/3e736e6e709f0b46d31c824f2de5a56d\",\"name\":\"Priyanka Kulkarni Joshi\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fortifying Cloud-Native Security: Evolution of Cloud Security","description":"The interview explores the fundamental changes and challenges, share best practices, and provide insights into safeguarding your cloud-native infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/","og_locale":"en_US","og_type":"article","og_title":"Fortifying Cloud-Native Security: Evolution of Cloud Security","og_description":"The interview explores the fundamental changes and challenges, share best practices, and provide insights into safeguarding your cloud-native infrastructure.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-01-08T13:03:00+00:00","article_modified_time":"2026-02-25T05:32:34+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/Fortifying-Cloud-Native-Environments-feature.jpg","type":"image\/jpeg"}],"author":"Priyanka Kulkarni Joshi","twitter_card":"summary_large_image","twitter_title":"Fortifying Cloud-Native Security: Evolution of Cloud Security","twitter_description":"The interview explores the fundamental changes and challenges, share best practices, and provide insights into safeguarding your cloud-native infrastructure.","twitter_image":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/Fortifying-Cloud-Native-Environments-feature.jpg","twitter_misc":{"Written by":"Priyanka Kulkarni Joshi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/"},"author":{"name":"Priyanka Kulkarni Joshi","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/3e736e6e709f0b46d31c824f2de5a56d"},"headline":"Fortifying Cloud-Native Environments: Experts Insights on the Evolution of Cloud Security","datePublished":"2024-01-08T13:03:00+00:00","dateModified":"2026-02-25T05:32:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/"},"wordCount":978,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/Fortifying-Cloud-Native-Environments-thumb.jpg","keywords":["Cloud","Cloud Security","cybersecurity","Data Protection","EC-Council","Information Security"],"articleSection":["Interview"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/","name":"Fortifying Cloud-Native Security: Evolution of Cloud Security","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/Fortifying-Cloud-Native-Environments-thumb.jpg","datePublished":"2024-01-08T13:03:00+00:00","dateModified":"2026-02-25T05:32:34+00:00","description":"The interview explores the fundamental changes and challenges, share best practices, and provide insights into safeguarding your cloud-native infrastructure.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/Fortifying-Cloud-Native-Environments-thumb.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/Fortifying-Cloud-Native-Environments-thumb.jpg","width":521,"height":521,"caption":"Fortifying Cloud-Native Environments"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/fortifying-cloud-native-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Interview","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/interview\/"},{"@type":"ListItem","position":4,"name":"Fortifying Cloud-Native Environments: Experts Insights on the Evolution of Cloud Security"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/3e736e6e709f0b46d31c824f2de5a56d","name":"Priyanka Kulkarni Joshi"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81298"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81298\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81304"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}