Cloud Native Security and Usage Report


For the past six years, we have shared an analysis of our real-world customer data to provide the community with insight into changing container usage and security trends. This report is based on data gathered from billions of containers, thousands of cloud accounts, and hundreds of thousands of applications that our customers operated over the course of the last year. This allows us to report on many different aspects of actual usage of containers and cloud, rather than rely on survey results.

The two biggest cloud security risks continue to be misconfigurations and vulnerabilities, which they are being introduced in greater numbers through software supply chains. We dove deep into this data for the 2023 issue of the report because it lands on the priority list of all security leaders. Unfortunately, 87% of container images running in production have a critical or high severity vulnerability. Despite increased adoption of shift-left security strategies to assess code early and often, organizations need runtime security. This is evidenced by the tremendous growth in the adoption of technologies like Falco, a Cloud Native Computing Foundation (CNCF) open source project, that helps organizations detect runtime threats across clouds, containers, hosts, and Kubernetes environments.

Please fill this form below to download the E-Book


 Cloud misconfiguration (ex. public S3 buckets)
 Stolen IAM credentials / Privilege escalation
 Vulnerabilities
 Cloud threats (ex. Cryptomining)
 Insider threat
 If other, please specify