What is cybersecurity mesh? Key applications and benefits

<p>Most security programs are extremely complicated. They’re using multiple cloud providers, an array of different cloud services, across IaaS, SaaS and PaaS cloud models.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>Environments can be exceedingly complex. Even just one individual application might span multiple cloud service models from multiple providers. As an example, consider a service-based application that does the following:</p>
<ul class=”default-list”>
<li>Uses <a href=”https://www.techtarget.com/searchaws/definition/AWS-Lambda-Amazon-Web-Services-Lambda”>AWS Lambda</a> and <a href=”https://www.techtarget.com/searchcloudcomputing/definition/Microsoft-Azure-Functions”>Microsoft Azure Functions</a> to serve content pages from containers in Google Cloud Run.</li>
<li>Fastly handles static delivery and edge logic compute.</li>
<li>API integration with Salesforce.</li>
<li>Connects to a business partner API hosted in Fly.io.</li>
<li>Uses identity services from Okta (Auth0).</li>
</ul>
<p>This is not an unrealistic scenario. But consider how many different service providers and models are baked into it. There are no less than seven cloud services and/or providers; it encompasses all three standard cloud models, CDN and edge computing, and spans multiple levels of the application stack.</p>
<p>Even so, this example is significantly <i>less</i><b> </b>complex than many actual applications in the field. Not included are tools such as Rollbar and LogRocket for recording application behavior, engagement tracking tools such as Meta Pixel, tag management tools such as Google Tag Manager, support integrations such as Intercom, Zendesk, and consent management tools such as OneTrust. Plus, there might be dozens — or in some cases even hundreds — of CI/CD, staging, test and integration environments.</p>
<p>The point is, technology ecosystems have become fragmented, decentralized and decoupled. At the same time, new developments have come along. The adoption of service mesh in Kubernetes-native architectures, for example, represents a f

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: