Cloud Native & 8 Major Trends Worth Paying Attention to in 2021. In addition to cloud native, there are eight major trends worth paying attention to in 2021. Cloud computing plays an irreplaceable function as an integral part of the modern technology in both the digitalization process of all walks of life and the general public’s everyday life.

Different resources and solutions focused on cloud computing are becoming more abundant at present, and the speed of iteration is clear to the naked eye as well. The cloud migrates a huge number of business data and transaction scenarios. The secure creation of the digital economy in the future is closely linked to whether or not the cloud is secure.

Tencent Security Cloud Ding Lab published the ‘Nine Patterns of Cloud Security 2021’ at GeekPwn2020, held on October 24, focused on cloud security activities and cutting-edge exploration, exploring the rapid growth of new infrastructure, rapid iteration of technology, and successive laws and regulations.

Fresh guidance for enterprise cloud security construction and the implementation direction of cloud security technology is provided by the emergence of new problems facing cloud security construction.

9 Major Trends of Cloud Security in 2021/2022 Update

These are the Nine Trends of Cloud Security in 2021. The 9 major trends worth paying attention to in 2021 is in addition to cloud native.

1. The rise of cloud-native security

The concept of cloud native has begun to be sound. But gradually matured and the ecology has container security issues frequently occur, cloud-native component security features generally missing, cloud-native security architectture and technology are urgently needed development.

2. The first year of zero trust deployment

The 5G era is coming, cloud-network-edge further intergration, tradition. The network is installed to the physical boundary of writting and editting globally disappears. The COncept and technology of zero trust began to mature and be put into practice.

3. Security systems centered on data mining

Data is the core driving force of the new economy, and the number of hands is wide. The growth of flow and data value promotes network-centric. The security system of the heart has gradually evolved into a data centric security system. Learn more from Big Data Solutions – Things you must know before Deployment.

4. New Identity Authentication

Identity authentication is transformed into human and human, human-machine, application use and application, the multi-dimentional trust relationship between machine and machine, diversified, fine grained, universal new identity authentication technology. Thousands of flower blossoms.

5. Continuous Quasi real-time security confrontation

The rise of containners and 5erverless technology antagonizes security into the millisecond era, the performance of macro and micro integration resistance, scale confrontation, and milliseconf-level confrontation have new development trend potentials.

6. Software supply chain security

Wide application of open source compoents, distributed heterogeneous computing. It is widespread, bringing Qin and hardware supply respectively. Chain security supply.

7. Dev5ec Ops is in the ascendant

With safety shift left, embedded and automation as the ideal Dev5ecOps concepts and products are gradually being applied.

8. Data Security “new” compliance

Data security compliance and personal information protection face new regulations, new standards and new situations bring new problems and solutions. Read the Privacy Confidentiality Protection in Big-data Policies. You will gain more updates on the Trends of Cloud Security.

Cloud Security governance model with multi-cloud collaboration

Data autonomy in the cloud, intelligence sharing between clouds, multi-cloud collaboration. The federated management model has become a new cloud security governance trend.

Related Prediction for Next Year

New security thought and changes in the offensive and defensive situation triggered by the growth of cloud-native technology cover the substance of the nine main trends; the network environment is becoming more and more dynamic, and the limits are progressively blurred and disappeared.

New identity authentication technology and the zero trust principle are taken into account; data volume development, data value enhancement, and data protection enforcement discovery and security ideas triggered by the successive implementation of laws and regulations; rapid cloud creation, new software and hardware supply chain security requirements induced by enhanced applications, etc.

1. Cloud-native security remains a core focus

Native to the Cloud is one of the hottest technology trends today. It also raises new security problems with the rapid growth of containers and serverless ones. Cloud-native security was only in the conceptual stage two or three years ago and few people were interested in it.

This year, however, both security vendors and cloud service providers are practically operating on this new security model. Tencent Security has previously fully disclosed its cloud-native security layout and, with a lot of cloud-native security experience and discovery, has been invited to become one of the first core members of the Academy of Information and Communications Technology’s cloud-native security working group.

Cloud Native Security

Cloud-native security has clear benefits, such as out-of-the-box, versatility, self-adaptation, and total protection of the life cycle, which increases the consistency and efficiency of security protection for businesses. In May this year, IDC’s “Top Ten Predictions for China’s Cloud Computing Market in 2020” pointed out that by 2022, 60 percent of China’s top 500 companies will invest in cloud-native applications and platforms automation, orchestration, and lifecycle management growth.

In the cloud native framework, however, there is a normal lack of protection, container security issues often occur, cloud native component security features are typically missing, and the design and technology of cloud native security urgently needs to be established.

Moreover, in the digital world, the emergence of cloud-native protection would also carry a butterfly effect. The persistent, quasi-real-time security confrontation described in the nine major trends is one of the notable manifestations.

It contributed to the collapse of conventional security models and confrontation strategies as the advent of containers and serverless technology took security confrontation into the millisecond-level era. A recent development pattern has been the constant, large-scale, and quasi-real-time confrontation of macro-micro-combination.

IT Architecture and IoT

In the typical IT architecture of the past, this is unthinkable. In the past, the purchasing of IT equipment from a set of procedures from collection, inspection, procurement, online, and distribution took just one and a half months to three months. Yet cloud applications are becoming more and more comprehensive at the moment.

Every millisecond, as emerging technologies such as IOT and autonomous driving are increasingly interconnected, a large number of attacks can occur, requiring fast-paced and continuous emergency response. The ability to conduct security operations would become a rigid necessity for protection of enterprise cloud security.

According to Li Bin, deputy general manager of Tencent Cloud Security, based on Tencent Security’s continuous optimization of the security operating system of the Tencent Cloud platform, combining intelligence, security incidents and big data for automated orchestration, hundreds of billions of attacks were successfully defended only in the first month of the epidemic period.

The trend also pointed out that cost reduction and efficiency increase would bring new productivity with the cloud-native era, continuous delivery and new software development models will be commonly used, and the definition of DevSecOps and products marked by left, embedded, and automation protection shift will gradually land application.

2. Compliance becomes the key word for data security

The nine main trends put forward two wind directions that businesses need to pay attention to in the data protection focus area, which is the most concerned by companies. In reality, these can also be seen as two starting points for businesses in the future to do a good job in data protection.

The establishment of a robust data security protection system needs a re-recognition of the importance of data, especially as data has now become a key factor in production. Extensive data flow and data value growth would enable the incremental transformation of a network-centered protection system (Net-Centric Security) into a data-centered security system (Data-Centric Security), thus enhancing data security’s full life cycle.

In the other hand, compliance, which is of greater real benefit to the company, after all, is unbearable for any company because of the actual penalties and the loss of goodwill to the company. As an example, take the newly revealed “Personal Information Security Rule” (draught). If the law is breached, up to 50 million yuan, or 5 percent of the annual revenue, can be fined.

Contact the previous “Cyber Security Legislation”, “Cryptography Law”, “Data Security Law” (draught), etc. is enforced one after another, businesses have to accept new laws, new requirements, and new enforcement paths facing data security and personal information protection in new circumstances.

3. New identity authentication technology application has become a rigid demand

Today, the key growth process and strategy of most firms has been corporate digitalization. In this phase, we can see that many challenges are faced by businesses. For example, several people’s working practises have taken place due to the effects of the epidemic to a certain degree this year.

Breakthrough advances have been accomplished by improvements, remote offices and online meetings; at the same time, technological growth is also trending. Further advancement and coverage of 5G technology. Point-to-point connections would replace existing links, triggering the physical limits of the traditional network as a whole. To vanish.

One of the challenges in future security construction is how to build a security protection model in a new form and how to define our digital identity.

In this context, a new identity authentication technology paradigm began to emerge with the notion of zero trust as the heart. From the conventional trust paradigm of the human-machine relationship to human beings, humans and machines, software and applications, and machines, identity authentication has shifted.

Multi-dimensional relationship

Multi-dimensional relationship of confidence with the unit. This implies that new identity authentication solutions that are diversified, fine-grained, and universal will prosper.

The cloud has been one of the main infrastructures for the digital transformation and upgrading of companies with the rapid growth of new infrastructure. A huge number of business data and transaction situations are transmitted to the cloud as more and more businesses prefer to go to the cloud.

Whether the digital economy will grow safely in the future is closely related to cloud protection. Analysis and discovery of developments in cloud security will advance the pulse of emerging infrastructure security threats and capture opportunities for the digital economy to grow.