{"id":68898,"date":"2023-11-11T00:14:58","date_gmt":"2023-11-11T00:14:58","guid":{"rendered":"https:\/\/www.azul.com\/?post_type=glossary&#038;p=68898"},"modified":"2024-03-27T22:05:17","modified_gmt":"2024-03-27T22:05:17","slug":"cloud-security","status":"publish","type":"glossary","link":"https:\/\/www.azul.com\/ja\/glossary\/cloud-security\/","title":{"rendered":"Cloud Security"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"what-is\">What is Cloud Security?<\/h2>\n\n\n\n<p>Cloud security is a practice adopted by enterprises that focuses on the oversight and management of security vulnerabilities, threats, and exposures in cloud components. As enterprises expand their operational components on the cloud, cloud security will continue to grow in importance and include the monitoring of networks, infrastructures, applications, and services.&nbsp;&nbsp;<\/p>\n\n\n\n\n\n<section    class=\"c-smart-content c-smart-content--color-dark c-smart-content--mt-default c-smart-content--mb-default c-smart-content--pt-default c-smart-content--pb-default c-smart-content--color-1 o-component o-component--color-dark o-component--mt-default o-component--mb-default o-component--pt-default o-component--pb-default\"\n\n            id=\"block_fcf8a1b5a2e4609f5809829d057788e6\"\n    \n    >\n    \n    <div class=\"o-component__wrap\">\n                    <div class=\"o-container\">\n        \n\n    \n    <div class=\"c-smart-content__grid c-smart-content__grid--4-cols\">\n        \n<a    class=\"c-smart-content__grid-item o-card o-card--has-image o-card--text-dark\"\n\n    \n            href=\"https:\/\/www.azul.com\/report\/2023-state-of-java\/\"\n        target=\"_blank\"\n    >\n    \n            \n    <span class=\"o-card__image o-picture o-picture--card\">\n\n<picture>\n                        \n            \n            <source\n                media=\"(max-width: 425px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/State-of-Java-2023-OG-Image.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=377&#038;s=7e635e0ec2138b69bf68e9d2ecdbecfc 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/State-of-Java-2023-OG-Image.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=754&#038;s=ee8ba64d380bd312a790655d71eeffb2 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 767px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/State-of-Java-2023-OG-Image.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=719&#038;s=d863a6a2eb7099039ec6e176fa7b48d4 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/State-of-Java-2023-OG-Image.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=1438&#038;s=d7617f75ecd38b30b18325ffc7be90cb 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1023px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/State-of-Java-2023-OG-Image.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=475&#038;s=d2c33e82e17a14c20a70c2899436e2ce 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/State-of-Java-2023-OG-Image.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=950&#038;s=dfd282dbd0da9ab6cff1d8b6bd892f99 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1440px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/State-of-Java-2023-OG-Image.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=262&#038;s=abc76d1436c127edf072d394264f15c9 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/State-of-Java-2023-OG-Image.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=524&#038;s=b8df867360f594b4942cacc744be5f60 2x\"\n            >\n            \n    <img alt=\"SoJ - Template1 - 1200x630 - 1\" class=\"o-picture__image\" height=\"138\" loading=\"lazy\" onerror=\"this.onerror=null;this.srcset=&quot;https:\/\/www.azul.com\/wp-content\/uploads\/State-of-Java-2023-OG-Image.jpg&quot;;while(this.parentNode.getElementsByTagName(&quot;source&quot;).length){this.parentNode.getElementsByTagName(&quot;source&quot;)[0].remove();}\" onload=\"if (this.parentNode.previousElementSibling) this.parentNode.previousElementSibling.remove()\" srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/State-of-Java-2023-OG-Image.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=262&#038;s=abc76d1436c127edf072d394264f15c9 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/State-of-Java-2023-OG-Image.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=524&#038;s=b8df867360f594b4942cacc744be5f60 2x\" width=\"262\">\n<\/picture>\n\n\n    <\/span>\n    \n    <div class=\"o-card__content\">\n                    \n<div  class=\"o-card__text-overline o-overline o-overline--pill\"\n  style=\"--setting--overline-bg-color: #DCFEFF; --setting--overline-text-color: #035E5E;\">\n  Research &#038; White Papers<\/div>\n        \n                    \n<h3  class=\"o-card__text-headline o-headline o-headline--h5 s-medium\"\n    >\n  Azul State of Java Survey and Report 2023<\/h3>\n        \n        \n        \n                    <div class=\"o-card__button\">\n                \n<button  class=\"o-card__button-cta o-button o-button--navy-900 o-button--text o-button--next\"\n\n  \n  >\n  \n  \n  <span class=\"o-button__label\">Read Now<\/span>\n\n      \n<i\n  class=\"o-button__icon o-icon\"\n  >east<\/i>\n  \n  <\/button>\n            <\/div>\n            <\/div>\n<\/a>\n\n<a    class=\"c-smart-content__grid-item o-card o-card--id-1 o-card--has-image o-card--text-dark\"\n\n    \n            href=\"https:\/\/www.azul.com\/wp-content\/uploads\/DS-Azul-Vulnerability-Detection-1.pdf\"\n        target=\"_self\"\n    >\n    \n            \n    <span class=\"o-card__image o-picture o-picture--card\">\n\n<picture>\n                        \n            \n            <source\n                media=\"(max-width: 425px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Screen-Shot-2022-11-17-at-12.31.23-PM-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=377&#038;s=318ba07a780f524f4a613dfa05572722 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Screen-Shot-2022-11-17-at-12.31.23-PM-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=754&#038;s=608a86067942293761fb32e24b35c8db 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 767px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Screen-Shot-2022-11-17-at-12.31.23-PM-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=719&#038;s=2dcdd61d40375b02894f11304cfd374a 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Screen-Shot-2022-11-17-at-12.31.23-PM-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=1438&#038;s=8d85390c8a5ef1e815356a9f1cd196d4 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1023px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Screen-Shot-2022-11-17-at-12.31.23-PM-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=475&#038;s=39f07af6f00474955b8d4c4b67f9859a 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Screen-Shot-2022-11-17-at-12.31.23-PM-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=950&#038;s=134b4675e726b2594c87121aa15cefcb 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1440px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Screen-Shot-2022-11-17-at-12.31.23-PM-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=262&#038;s=5b1051b7bcf02c292cac4965aec8fc24 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Screen-Shot-2022-11-17-at-12.31.23-PM-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=524&#038;s=48fdcb729fc2f3215ad04ab9d728414b 2x\"\n            >\n            \n    <img alt=\"Screen Shot 2022-11-17 at 12.31.23 PM-min\" class=\"o-picture__image\" height=\"201\" loading=\"lazy\" onerror=\"this.onerror=null;this.srcset=&quot;https:\/\/www.azul.com\/wp-content\/uploads\/Screen-Shot-2022-11-17-at-12.31.23-PM-min.jpg&quot;;while(this.parentNode.getElementsByTagName(&quot;source&quot;).length){this.parentNode.getElementsByTagName(&quot;source&quot;)[0].remove();}\" onload=\"if (this.parentNode.previousElementSibling) this.parentNode.previousElementSibling.remove()\" srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Screen-Shot-2022-11-17-at-12.31.23-PM-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=262&#038;s=5b1051b7bcf02c292cac4965aec8fc24 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Screen-Shot-2022-11-17-at-12.31.23-PM-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=524&#038;s=48fdcb729fc2f3215ad04ab9d728414b 2x\" width=\"262\">\n<\/picture>\n\n\n    <\/span>\n    \n    <div class=\"o-card__content\">\n                    \n<div  class=\"o-card__text-overline o-overline o-overline--pill\"\n  style=\"--setting--overline-bg-color: #FEEBFD; --setting--overline-text-color: #74299E;\">\n  Data Sheets<\/div>\n        \n                    \n<h3  class=\"o-card__text-headline o-headline o-headline--h5 s-medium\"\n    >\n  Azul Vulnerability Detection: Continuously Detect Known Vulnerabilities in Your Java Applications<\/h3>\n        \n        \n        \n                    <div class=\"o-card__button\">\n                \n<button  class=\"o-card__button-cta o-button o-button--navy-900 o-button--text o-button--next\"\n\n  \n  >\n  \n  \n  <span class=\"o-button__label\">Read Now<\/span>\n\n      \n<i\n  class=\"o-button__icon o-icon\"\n  >east<\/i>\n  \n  <\/button>\n            <\/div>\n            <\/div>\n<\/a>\n\n<a    class=\"c-smart-content__grid-item o-card o-card--id-2 o-card--has-image o-card--text-dark\"\n\n    \n            href=\"https:\/\/www.azul.com\/omdia-security-report\/\"\n        target=\"_blank\"\n    >\n    \n            \n    <span class=\"o-card__image o-picture o-picture--card\">\n\n<picture>\n                        \n            \n            <source\n                media=\"(max-width: 425px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Why-Securing-the-Software-Supply-Chain-Is-Critical.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=377&#038;s=2dda899a9edcd5ee4af9957ab000c0c2 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Why-Securing-the-Software-Supply-Chain-Is-Critical.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=754&#038;s=f5e043480bff48e7a90fd3d859f830b3 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 767px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Why-Securing-the-Software-Supply-Chain-Is-Critical.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=719&#038;s=fe6002b2246739dae2c4591df38eede5 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Why-Securing-the-Software-Supply-Chain-Is-Critical.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=1438&#038;s=8cb233892ae0d0561af6806bb53ca1a2 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1023px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Why-Securing-the-Software-Supply-Chain-Is-Critical.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=475&#038;s=ffc223123536383f5d90856e8caafaca 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Why-Securing-the-Software-Supply-Chain-Is-Critical.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=950&#038;s=2ab36a8a00e66277ec29786f5df7f199 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1440px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Why-Securing-the-Software-Supply-Chain-Is-Critical.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=262&#038;s=31b1f575893e896bb54002624e38d658 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Why-Securing-the-Software-Supply-Chain-Is-Critical.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=524&#038;s=5f2487331330beb9b81c4e1971338f1c 2x\"\n            >\n            \n    <img alt=\"Why Securing the Software Supply Chain Is Critical\" class=\"o-picture__image\" height=\"201\" loading=\"lazy\" onerror=\"this.onerror=null;this.srcset=&quot;https:\/\/www.azul.com\/wp-content\/uploads\/Why-Securing-the-Software-Supply-Chain-Is-Critical.jpg&quot;;while(this.parentNode.getElementsByTagName(&quot;source&quot;).length){this.parentNode.getElementsByTagName(&quot;source&quot;)[0].remove();}\" onload=\"if (this.parentNode.previousElementSibling) this.parentNode.previousElementSibling.remove()\" srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Why-Securing-the-Software-Supply-Chain-Is-Critical.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=262&#038;s=31b1f575893e896bb54002624e38d658 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Why-Securing-the-Software-Supply-Chain-Is-Critical.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=524&#038;s=5f2487331330beb9b81c4e1971338f1c 2x\" width=\"262\">\n<\/picture>\n\n\n    <\/span>\n    \n    <div class=\"o-card__content\">\n                    \n<div  class=\"o-card__text-overline o-overline o-overline--pill\"\n  style=\"--setting--overline-bg-color: #DCFEFF; --setting--overline-text-color: #035E5E;\">\n  Research &#038; White Papers<\/div>\n        \n                    \n<h3  class=\"o-card__text-headline o-headline o-headline--h5 s-medium\"\n    >\n  Omdia Report: Why Securing the Software Supply Chain Is Critical<\/h3>\n        \n        \n        \n                    <div class=\"o-card__button\">\n                \n<button  class=\"o-card__button-cta o-button o-button--navy-900 o-button--text o-button--next\"\n\n  \n  >\n  \n  \n  <span class=\"o-button__label\">Read Now<\/span>\n\n      \n<i\n  class=\"o-button__icon o-icon\"\n  >east<\/i>\n  \n  <\/button>\n            <\/div>\n            <\/div>\n<\/a>\n\n<a    class=\"c-smart-content__grid-item o-card o-card--id-3 o-card--has-image o-card--text-dark\"\n\n    \n            href=\"https:\/\/www.azul.com\/blog\/moving-security-into-the-jvm\/\"\n        target=\"_self\"\n    >\n    \n            \n    <span class=\"o-card__image o-picture o-picture--card\">\n\n<picture>\n                        \n            \n            <source\n                media=\"(max-width: 425px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-security-jvm.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=377&#038;s=a5c0bdf835aa5d46541bfa78473dcdbf 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-security-jvm.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=754&#038;s=46cdbc6d951075aec3532755c813d77a 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 767px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-security-jvm.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=719&#038;s=936f0947aa7eb892445a34276012687c 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-security-jvm.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=1438&#038;s=3c8bb0c0df0fccd47fa6c0b6521c5a1b 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1023px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-security-jvm.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=475&#038;s=a9f331f9e687a5bd3ca07aaf6b0e7bb4 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-security-jvm.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=950&#038;s=56650b2db8c388b829b9d2b4c9eaf2f9 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1440px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-security-jvm.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=262&#038;s=48953ce1e77516d84bd4dad67f07013c 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-security-jvm.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=524&#038;s=21172eda16b8fe4c3d23ba42998af273 2x\"\n            >\n            \n    <img class=\"o-picture__image\" height=\"102\" loading=\"lazy\" onerror=\"this.onerror=null;this.srcset=&quot;https:\/\/www.azul.com\/wp-content\/uploads\/11-2-security-jvm.jpg&quot;;while(this.parentNode.getElementsByTagName(&quot;source&quot;).length){this.parentNode.getElementsByTagName(&quot;source&quot;)[0].remove();}\" onload=\"if (this.parentNode.previousElementSibling) this.parentNode.previousElementSibling.remove()\" srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-security-jvm.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=262&#038;s=48953ce1e77516d84bd4dad67f07013c 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-security-jvm.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=524&#038;s=21172eda16b8fe4c3d23ba42998af273 2x\" width=\"262\">\n<\/picture>\n\n\n    <\/span>\n    \n    <div class=\"o-card__content\">\n                    \n<div  class=\"o-card__text-overline o-overline o-overline--pill\"\n  style=\"--setting--overline-bg-color: #FEEBFD; --setting--overline-text-color: #74299E;\">\n  Security<\/div>\n        \n                    \n<h3  class=\"o-card__text-headline o-headline o-headline--h5 s-medium\"\n    >\n  Moving Security into the JVM<\/h3>\n        \n                    <div class=\"o-card__text-subheadline s-wysiwyg o-card__text-subheadline--image\">\n                Erik Costlow \/ 11\u6708 2, 2022            <\/div>\n        \n        \n                    <div class=\"o-card__button\">\n                \n<button  class=\"o-card__button-cta o-button o-button--navy-900 o-button--text o-button--next\"\n\n  \n  >\n  \n  \n  <span class=\"o-button__label\">Read Now<\/span>\n\n      \n<i\n  class=\"o-button__icon o-icon\"\n  >east<\/i>\n  \n  <\/button>\n            <\/div>\n            <\/div>\n<\/a>\n    <\/div>\n\n\n          <\/div>\n      <\/div>\n<\/section>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"purpose\">What is the purpose of cloud security?<\/h2>\n\n\n\n<p>Given Java\u2019s enterprise prevalence, securing the applications and software running on top of the platform is a must for maintaining customer trust. Business and technical leaders are faced with securing enterprise systems and customer data against an explosive growth of known vulnerabilities in 3rd party software components and applications. In Q1 2022, there were 200+ known Common Vulnerabilities and Exposures (CVEs) in 3rd party Java applications and components, many with the highest risk score, cutting across thousands of contributors.&nbsp;<\/p>\n\n\n\n<p>Failure to detect and patch known vulnerabilities in Java application estates can expose organizations to significant impact and cost, including financial penalties running into the&nbsp;<\/p>\n\n\n\n<p>hundreds of millions of dollars, compromise of customer data, and turnover in executive staff.&nbsp;<\/p>\n\n\n\n<p>The Log4Shell vulnerability elevated visibility into the need for addressing cloud security. A vulnerability in the commonly used Java-based Log4j library was uncovered, potentially exposing the data of organizations that used an unpatched version of the library. &nbsp;and their customers to potential threats. In many companies, companies didn\u2019t know if they used Log4j, and they didn\u2019t know where to find it to patch it. The result was a burden on engineering teams, which had to spend time finding it.&nbsp;<\/p>\n\n\n\n<p>The threat, it turned out, was real. The <a href=\"https:\/\/www.azul.com\/report\/2023-state-of-java\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azul State of Java Survey and Report 2023<\/a>, an independently run study of more than 2,000 companies using Java, found that 79% of organizations were impacted directly or indirectly by Log4Shell.&nbsp;<\/p>\n\n\n\n<p>While many leaders understand the necessity of security in their organization, important considerations often go overlooked. Cloud security covers a broad range of disciplines that include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Policies for technology adoption&nbsp;<\/li>\n\n\n\n<li>Network security&nbsp;<\/li>\n\n\n\n<li>Internal security protocols&nbsp;<\/li>\n\n\n\n<li>Application vulnerability management&nbsp;<\/li>\n\n\n\n<li>Response strategies to threats&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"challenges\">What challenges prevent enterprises from achieving cloud security?<\/h2>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>Lack of insight and visibility&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>With large and outdated technology systems, many enterprises lack security information about their production environments. Without proper feedback from cloud resources, organizations fail to maintain oversight.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>Insufficient security strategy&nbsp;&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Enterprises that impulsively adopted cloud technology in their earlier stages did so without developing a comprehensive enterprise-wide strategy, causing leaders to try to retrofit security into existing applications and third-party components.&nbsp;&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>Absence of security culture&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>When employees aren\u2019t trained to identify security threats, they can unknowingly expose their organization to malicious attackers.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Additionally, many leaders fail to prioritize security in their technology adoption strategies until after an adverse event. It is important to invest proactively in technology that can identify and address security vulnerabilities, as these investments will help save enterprises money in the long run.&nbsp;&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>Failure to consider technology performance&nbsp;&nbsp;&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>When enterprises approach security strategies, we often see one of two cases. Companies sparingly adopt security technology, as they don\u2019t understand the value of these investments. In contrast, we see companies incorrectly adopt security technology services that compromise the performance capabilities of their applications. It is important for enterprises to strategize their security investments to properly protect their infrastructure, without impacting performance.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"strategies\">What are general cloud security strategies?<\/h2>\n\n\n\n<p>Some approaches Azul recommends for maintaining secure cloud environments include&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>Regularly updating your technology systems&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>While technology updates patch known vulnerabilities, they also expose the presence of these vulnerabilities in any previous versions.&nbsp;&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>Adopt vulnerability management technology&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>CVE tools can be used to address security concerns, but not all tools are created equal. They differ in where they run in applications, as well as their time of assessment. Some tools require additional agents that need to be installed and configured, whereas others fail to provide insight in the actual production environment.&nbsp;<\/p>\n\n\n\n<p>Azul Vulnerability Detection, a feature of Azul Intelligence Cloud, locates vulnerabilities in production. Azul Vulnerability Detection makes security a byproduct of simply running your Java code, while also limiting false positives and improving the accuracy of vulnerability management.\u00a0<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>Prioritize security in company culture&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>It is important that technology is adopted and used by all members of the enterprise with security in mind. Employees play a critical role in cloud security and must be trained appropriately to identify and avoid potential threats.&nbsp;&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>Continuously reevaluate your systems&nbsp;&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>It is important to stay up to date on information from security experts to continuously reassess your systems with this information.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"application-security\">How does application security impact overall cloud security?<\/h2>\n\n\n\n<p>The cloud contains many interconnected components, which are all important to consider when approaching cloud security. However, application security is often overlooked, yet it is a critical component to maintaining cloud security. It is important that developers keep this in mind when building applications for their enterprises. Additionally, enterprises need to consider the importance of application security when managing technology investments. A failure to recognize the importance of application security can create security exposures throughout entire cloud systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"exposures\">Why are applications vulnerable to security exposures?<\/h2>\n\n\n\n<p>Java applications are often developed using open-source technology, a practice that allows developers to collaborate in the application development process. While open-source technology has many benefits, it is prone to vulnerability exposures. Everyone has access to the same codes, so attackers can analyze available codes and identify opportunities for exploitation. This is why it is important to monitor security within applications.<\/p>\n\n\n\n<p>The Azul State of Java Survey and Report 2023 backs up the concern over third-party and open-source applications and libraries. Nearly 60% of respondents named them as the most concerning sources of CVEs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-azul-helps\">How does Azul help with cloud security?<\/h2>\n\n\n\n<p>Azul Vulnerability Detection is a feature of Azul Intelligence Cloud that allows users to continuously monitor their Java applications to detect known vulnerabilities in production. By leveraging Azul JVMs, it produces more accurate results with no performance penalty and eliminates false positives.<\/p>\n\n\n\n<p>Vulnerability Detection monitors all your Java software and applications to accurately identify components loaded and in use in production. Vulnerability Detection uniquely identifies each component using bytecode-aware hashing techniques. It maps these components accurately to vulnerabilities in a knowledge base updated daily with the latest CVEs from external databases, publicly available information, and more.<\/p>\n\n\n\n<p>This enables accurate, continuous assessment of custom and vendor applications exposure to vulnerabilities in production without the need for source code. Vulnerability \u201cjust works\u201d to detect vulnerabilities in all Java applications \u2013 whether you built it or not, haven&#8217;t built it in years, or are introducing a regression with a recent change.<\/p>\n\n\n\n<p>Vulnerability Detection focuses scarce human effort by eliminating false positives. It does this by monitoring the code loaded and in use by applications running on the JVM vs looking at static file listings and source code.<\/p>\n\n\n\n<p>Since Azul Vulnerability Detection leverages runtime information from Azul JVMs, there is no additional agent or software to deploy or manage, resulting in minimal operational burden and performance overhead.<\/p>\n\n\n\n\n\n<section    class=\"c-cta-band c-cta-band--color-light c-cta-band--mt-default c-cta-band--mb-default c-cta-band--pt-default c-cta-band--pb-lg c-cta-band--color-1 o-component o-component--color-light o-component--mt-default o-component--mb-default o-component--pt-default o-component--pb-lg\"\n\n            id=\"block_3fab8e4b48e08e18b17773d318941ea9\"\n    \n    >\n    \n    <div class=\"o-component__wrap\">\n                    <div class=\"o-container\">\n        \n<div class=\"c-cta-band__wrap c-cta-band__wrap--shadow c-cta-band__wrap--bg-white\" id=\"c-cta-band__wrap--block_3fab8e4b48e08e18b17773d318941ea9\">\n            \n    <span class=\"o-picture o-picture--background o-picture--cover o-picture--no-radius\">\n\n<picture>\n    \n    <img decoding=\"async\" alt=\"avd-banner\" class=\"o-picture__image\" height=\"228\" loading=\"lazy\" src=\"https:\/\/www.azul.com\/wp-content\/uploads\/avd-banner.svg?no_imgix=true\" width=\"1120\">\n<\/picture>\n\n\n    <\/span>\n    \n    <div class=\"c-cta-band__content\">\n        <div class=\"c-cta-band__text\" id=\"c-cta-band__text--block_3fab8e4b48e08e18b17773d318941ea9\">\n                            \n<h2  class=\"c-cta-band__headline o-headline o-headline--h2 s-medium\"\n    >\n  Azul Vulnerability Detection<\/h2>\n            \n                            \n<div  class=\"c-cta-band__description o-description o-description--body s-wysiwyg s-wysiwyg--description\"\n\n  >\n  <p>Continuously detect known vulnerabilities<br \/>\nin your Java applications in production.<\/p>\n<\/div>\n                    <\/div>\n\n                    <div class=\"c-cta-band__cta\">\n                \n<a  class=\"c-cta-band__cta-btn o-button o-button--fuchsia-900 o-button--white-solid\"\n\n  data-cta-band-modal-id=\"cta-band-form-modal-block_3fab8e4b48e08e18b17773d318941ea9\" href='https:\/\/www.azul.com\/products\/vulnerability-detection\/' target=''\n  >\n  \n  \n  <span class=\"o-button__label\">Learn More<\/span>\n\n  \n  <\/a>\n            <\/div>\n        \n            <\/div>\n<\/div>\n\n\n          <\/div>\n      <\/div>\n<\/section>\n\n<style>\n            #block_3fab8e4b48e08e18b17773d318941ea9,\n        #block_3fab8e4b48e08e18b17773d318941ea9 input::placeholder {\n            color: light;\n        }\n    <\/style>\n","protected":false},"template":"","class_list":["post-68898","glossary","type-glossary","status-publish","hentry"],"acf":{"header_title":"Cloud Security","sidebar_nav_items":[{"link":{"title":"What is Cloud Security?","url":"#what-is","target":""}},{"link":{"title":"What is the purpose of cloud security?","url":"#purpose","target":""}},{"link":{"title":"What challenges prevent enterprises from achieving cloud security?","url":"#challenges","target":""}},{"link":{"title":"What are general cloud security strategies?","url":"#strategies","target":""}},{"link":{"title":"How does application security impact overall cloud security?","url":"#application-security","target":""}},{"link":{"title":"Why are applications vulnerable to security exposures?","url":"#exposures","target":""}},{"link":{"title":"How does Azul help with cloud security?","url":"#how-azul-helps","target":""}}]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Cloud Security? - Azul | Better Java Performance, Superior Java Support<\/title>\n<meta name=\"description\" content=\"Cloud security focuses on best practices, oversight, management, and remediation of security vulnerabilities, threats, and exposures in cloud components.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.azul.com\/glossary\/cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security\" \/>\n<meta property=\"og:description\" content=\"Cloud security focuses on best practices, oversight, management, and remediation of security vulnerabilities, threats, and exposures in cloud components.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.azul.com\/glossary\/cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Azul | Better Java Performance, Superior Java Support\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AzulSystemsInc\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-27T22:05:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.azul.com\/wp-content\/uploads\/What-is-Cloud-Security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2408\" \/>\n\t<meta property=\"og:image:height\" content=\"1262\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@azulsystems\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"6\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.azul.com\/glossary\/cloud-security\/\",\"url\":\"https:\/\/www.azul.com\/glossary\/cloud-security\/\",\"name\":\"What is Cloud Security? - Azul | Better Java Performance, Superior Java Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.azul.com\/#website\"},\"datePublished\":\"2023-11-11T00:14:58+00:00\",\"dateModified\":\"2024-03-27T22:05:17+00:00\",\"description\":\"Cloud security focuses on best practices, oversight, management, and remediation of security vulnerabilities, threats, and exposures in cloud components.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.azul.com\/glossary\/cloud-security\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.azul.com\/glossary\/cloud-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.azul.com\/glossary\/cloud-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.azul.com\/ja\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossary\",\"item\":\"https:\/\/www.azul.com\/glossary\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloud Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.azul.com\/#website\",\"url\":\"https:\/\/www.azul.com\/\",\"name\":\"Azul | Better Java Performance, Superior Java Support\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.azul.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.azul.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.azul.com\/#organization\",\"name\":\"Azul\",\"alternateName\":\"Azul Systems\",\"url\":\"https:\/\/www.azul.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.azul.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.azul.com\/wp-content\/uploads\/2021\/01\/logo.svg\",\"contentUrl\":\"https:\/\/www.azul.com\/wp-content\/uploads\/2021\/01\/logo.svg\",\"width\":112,\"height\":48,\"caption\":\"Azul\"},\"image\":{\"@id\":\"https:\/\/www.azul.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/AzulSystemsInc\",\"https:\/\/x.com\/azulsystems\",\"https:\/\/www.youtube.com\/channel\/UCSoJZa--HhjV9iXtbHUmm8A\",\"https:\/\/www.linkedin.com\/company\/azul-systems\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Cloud Security? - Azul | Better Java Performance, Superior Java Support","description":"Cloud security focuses on best practices, oversight, management, and remediation of security vulnerabilities, threats, and exposures in cloud components.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.azul.com\/glossary\/cloud-security\/","og_locale":"ja_JP","og_type":"article","og_title":"Cloud Security","og_description":"Cloud security focuses on best practices, oversight, management, and remediation of security vulnerabilities, threats, and exposures in cloud components.","og_url":"https:\/\/www.azul.com\/glossary\/cloud-security\/","og_site_name":"Azul | Better Java Performance, Superior Java Support","article_publisher":"https:\/\/www.facebook.com\/AzulSystemsInc","article_modified_time":"2024-03-27T22:05:17+00:00","og_image":[{"width":2408,"height":1262,"url":"https:\/\/www.azul.com\/wp-content\/uploads\/What-is-Cloud-Security.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@azulsystems","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"6\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.azul.com\/glossary\/cloud-security\/","url":"https:\/\/www.azul.com\/glossary\/cloud-security\/","name":"What is Cloud Security? - Azul | Better Java Performance, Superior Java Support","isPartOf":{"@id":"https:\/\/www.azul.com\/#website"},"datePublished":"2023-11-11T00:14:58+00:00","dateModified":"2024-03-27T22:05:17+00:00","description":"Cloud security focuses on best practices, oversight, management, and remediation of security vulnerabilities, threats, and exposures in cloud components.","breadcrumb":{"@id":"https:\/\/www.azul.com\/glossary\/cloud-security\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.azul.com\/glossary\/cloud-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.azul.com\/glossary\/cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.azul.com\/ja\/"},{"@type":"ListItem","position":2,"name":"Glossary","item":"https:\/\/www.azul.com\/glossary\/"},{"@type":"ListItem","position":3,"name":"Cloud Security"}]},{"@type":"WebSite","@id":"https:\/\/www.azul.com\/#website","url":"https:\/\/www.azul.com\/","name":"Azul | Better Java Performance, Superior Java Support","description":"","publisher":{"@id":"https:\/\/www.azul.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.azul.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.azul.com\/#organization","name":"Azul","alternateName":"Azul Systems","url":"https:\/\/www.azul.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.azul.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.azul.com\/wp-content\/uploads\/2021\/01\/logo.svg","contentUrl":"https:\/\/www.azul.com\/wp-content\/uploads\/2021\/01\/logo.svg","width":112,"height":48,"caption":"Azul"},"image":{"@id":"https:\/\/www.azul.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/AzulSystemsInc","https:\/\/x.com\/azulsystems","https:\/\/www.youtube.com\/channel\/UCSoJZa--HhjV9iXtbHUmm8A","https:\/\/www.linkedin.com\/company\/azul-systems"]}]}},"_links":{"self":[{"href":"https:\/\/www.azul.com\/ja\/wp-json\/wp\/v2\/glossary\/68898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.azul.com\/ja\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.azul.com\/ja\/wp-json\/wp\/v2\/types\/glossary"}],"wp:attachment":[{"href":"https:\/\/www.azul.com\/ja\/wp-json\/wp\/v2\/media?parent=68898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}