The anatomy of a cloud native security attack

1st June 2021 | 2:00 PM BST | United Kingdom


The anatomy of a cloud native security attack

In this session, we will demonstrate that, while cloud native security attacks still follow the classic kill chain or MITRE ATT&CK framework, the artifacts and processes involved differ. For example, in cloud native development, many times public images are used and re-used over and over again, and accessed through public libraries (this is not a recommended security practice. . .but it is still done quite often). Attackers have figured out that they can access cloud native environments through this supply chain, masquerading as legitimate projects to get unwitting users to download malicious images. Those malicious images then carry out the attack – for example, hijacking cloud resources to run cryptomining operations. We will share examples like this of how we have seen attackers evade detection and carry out attacks in the wild. This session is for those who want to understand what real cloud native attacks look like, and how to avoid them.



The Benefits of a Virtual Roundtable


100 minutes of Engagement

We believe that 100 minutes is the perfect amount of time to engage the whole audience of the Virtual Roundtable and get to know what challenges are being faced and how they are adapting to combat them

Global Network

Connect with 1000's of industry leader in multiple sectors from across the globe. Or be as specific as your business requires. Our network is incredibly diverse & vast

Digital Leadership

Generate business leads without leaving the office. Our Virtual Platform puts you in control allowing you to share, present and engage with your audiance. Become the Digital Leader


About Aqua Security

Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and run their businesses with minimal friction. The Aqua Cloud Native Security Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads wherever they are deployed. Aqua customers are among the world’s largest enterprises in financial services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions, and cloud VMs.

Morphisec Icon

What is a Virtual Roundtable?

A Virtual Roundtable is a thought-leading discussion between senior corporate leaders using video conferencing technology. Offering a digital alternative to physical business events and roundtable dinners, Virtual Roundtables help professionals to identify actionable solutions to their key challenges without the need to leave their home or office.

get in touch

Enquire today for more information