The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, is making significant updates to its certification offerings.
Endor Labs announced that Microsoft has natively integrated its advanced SCA capabilities within Microsoft Defender for Cloud, a Cloud-Native Application Protection Platform (CNAPP).
This integration further empowers organizations to consolidate their application security and cloud security programs into a single platform, securing cloud workloads and code seamlessly in one place. Customers can now deploy SCA and CNAPP solutions from a unified dashboard, achieving comprehensive security coverage from code to runtime.
With the native integration, teams can correlate SCA findings with runtime alerts to view code-to-runtime attack paths. This means security teams can now trace exploitable vulnerabilities found in open-source software (OSS) dependencies directly to potential exploit paths in their cloud environments. By connecting the dots between application code and cloud infrastructure, teams can prioritize remediation efforts more effectively, reducing risk across the entire software development lifecycle. Code-to-runtime context also reveals toxic combinations of security issues, for example, a reachable vulnerability in an open-source package that is used on an internet reachable cloud workload. The native integration allows Defender for Cloud users to see a full attack path, from code committed (e.g. in Microsoft Azure DevOps, GitHub, or GitLab) to runtime workloads deployed on Azure, AWS, or Google Cloud Platform.
Currently in Public Preview, the Endor Labs integration with Microsoft Defender for Cloud brings function-level reachability analysis directly into the Defender for Cloud console. This addresses a critical challenge in application security: although only 9.5% of vulnerabilities are exploitable within a given application context, teams often lack the means to identify which ones are truly critical. Without proper context, they face the dilemma of conducting time-consuming manual research or attempting to fix all vulnerabilities, neither of which is sustainable nor efficient. With vulnerability findings often numbering in the hundreds or thousands, strategy supports business requirements or compliance SLAs (such as FedRAMP).
Endor Labs provides a natively integrated software as a service (SaaS) solution for reachability-based SCA. With the Defender for Cloud integration, deploying and configuring SCA becomes a streamlined process. Once deployed, Security engineers receive function-level reachability analysis for each vulnerability finding, whether discovered at build or in production, and can see where function-level reachable vulnerabilities are part of running applications. A "reachable" finding indicates an attack path exists from the developer's code through OSS dependencies to a vulnerable library or function. With this insight, security engineers can identify genuine threats and prioritize remediation based on the exploit's probability and severity.
By unifying SCA findings and cloud security findings, and providing new methods of prioritization, the collaboration consolidates tools and reduces noise. Application and Cloud Security teams are now able to achieve end-to-end protection without the productivity tax of implementing, maintaining, and using multiple platforms.
Industry News
The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, announced the Golden Kubestronaut program, a distinguished recognition for professionals who have demonstrated the highest level of expertise in Kubernetes, cloud native technologies, and Linux administration.
Red Hat announced new capabilities and enhancements for Red Hat Developer Hub, Red Hat’s enterprise-grade internal developer portal based on the Backstage project.
Platform9 announced that Private Cloud Director Community Edition is generally available.
Sonatype expanded support for software development in Rust via the Cargo registry to the entire Sonatype product suite.
CloudBolt Software announced its acquisition of StormForge, a provider of machine learning-powered Kubernetes resource optimization.
Mirantis announced the k0rdent Application Catalog – with 19 validated infrastructure and software integrations that empower platform engineers to accelerate the delivery of cloud-native and AI workloads wherever the\y need to be deployed.
Traefik Labs announced its Kubernetes-native API Management product suite is now available on the Oracle Cloud Marketplace.
webAI and MacStadium(link is external) announced a strategic partnership that will revolutionize the deployment of large-scale artificial intelligence models using Apple's cutting-edge silicon technology.
Development work on the Linux kernel — the core software that underpins the open source Linux operating system — has a new infrastructure partner in Akamai. The company's cloud computing service and content delivery network (CDN) will support kernel.org, the main distribution system for Linux kernel source code and the primary coordination vehicle for its global developer network.
Komodor announced a new approach to full-cycle drift management for Kubernetes, with new capabilities to automate the detection, investigation, and remediation of configuration drift—the gradual divergence of Kubernetes clusters from their intended state—helping organizations enforce consistency across large-scale, multi-cluster environments.
Red Hat announced the latest updates to Red Hat AI, its portfolio of products and services designed to help accelerate the development and deployment of AI solutions across the hybrid cloud.
CloudCasa by Catalogic announced the availability of the latest version of its CloudCasa software.
BrowserStack announced the launch of Private Devices, expanding its enterprise portfolio to address the specialized testing needs of organizations with stringent security requirements.
Chainguard announced Chainguard Libraries, a catalog of guarded language libraries for Java built securely from source on SLSA L2 infrastructure.