EXPEL BLOG

Comparison of cloud resources (part III): Demystifying cloud security tools in the platform and application layer

alt=""

· 14 MIN READ · ETHAN CHEN · APR 7, 2025 · TAGS: Get technical

TL;DR

  • This is part three of four in our Comparison of cloud resources blog series
  • For more, see parts one, two, and four 
  • Part three defines and details cloud security tools in the platform and application layers 

 

This blog series will explore cloud security in depth. We’ll discuss the layers to protect and define the tools available for each. In part four, we’ll offer a road map to reduce cloud security risks. We’ll also explore how Expel works to eliminate security gaps at every layer to help you achieve comprehensive protection for your cloud environments. 

Platform layer

Attackers target the platform layer to access both the workloads it runs and the orchestration-layer services it connects with. Security teams need tools that can help them close vulnerabilities before they can be exploited—and detect any threats that do slip through.

Cloud workload protection platform (CWPP)

Continuing our analogies to the security tools already discussed, CWPP is similar to CDR. It performs some of the same functions as a vulnerability scanning tool, but focuses specifically on containers and VMs. Its role includes:

  • Continuous monitoring and threat detection for cloud workloads, including VMs, containers, and serverless functions. 
  • Automated vulnerability assessments, configuration checks, and malware scanning to identify and prioritize security risks within containers.
  • Automated responses to neutralize threats.

Example use case:

A healthcare organization runs workloads for containerized clinical applications at the platform layer of its cloud infrastructure. 

  1. Attackers exploit a misconfigured container to inject malware into its memory. 
  2. The malware attempts to exfiltrate sensitive patient data and spread laterally to other containers in the cluster. 
  3. The company’s CWPP detects unusual API calls and unauthorized processes in the container. 
  4. Recognizing this as malicious behavior, the tool isolates the container by restricting its network access and stopping its execution. 

To prevent future attacks from exploiting the same vulnerability, the CWPP scans the container images used in the environment to identify any unpatched libraries or dependencies. It then provides recommendations for rebuilding and updating secure images across the cluster. 

Examples of CWPP tools include Prisma Cloud Compute, Orca Security, Aqua, and Sysdig, Armo, and Raven.

 

Vulnerability scanning and assessment 

Vulnerability management (aka VM, but we’ll spell it out here to avoid confusion with virtual machines) is a foundational security function for every organization. We explore this topic in greater depth in our blog post on vulnerability management for cloud environments

At a high level, vulnerability management is the continuous process of identifying, assessing, prioritizing, and remediating security gaps before they can be exploited. These weaknesses can include misconfigurations, unpatched software, insecure APIs and protocols, and other potential vulnerabilities. 

In contrast to CPSM—which focuses on cloud configuration risks—vulnerability scanning identifies weaknesses on application hosts, as well as some risks within applications themselves. 

Example use case:

A large university’s cloud environment has grown and evolved rapidly, raising concerns that vulnerabilities have also proliferated. 

  1. The university’s IT team uses a VM tool to conduct a thorough scan of its compute instances, container images, and APIs for known vulnerabilities. 
  2. The assessment turns up an unpatched operating system on a virtual machine, outdated libraries in a container image, and a vulnerability in an exposed API. 
  3. The tool’s dashboard provides a complete list of detected vulnerabilities ranked by severity, with the API at the top. It could easily be exploited for access to sensitive data. 
  4. Remediation guidance helps the team mitigate the most important risks and improve compliance with regulatory data security requirements. 

Examples of vulnerability scanning and assessment tools include: Qualys, Rapid7, and Tenable.

 

Application layer

Security tools at the application layer focus on protecting cloud-based applications throughout their lifecycles. This includes securing applications in production, their data, and the way users and services interact with them, as well as safeguarding the DevOps pipeline and its resources. 

First, we’ll explore tools focusing on applications in production. 

Application detection and response (ADR) 

ADR follows a familiar pattern: It serves a similar purpose to CDR and KDR, but for applications. An ADR platform provides continuous monitoring and threat detection across cloud-based applications, services, and their interactions. Security teams gain visibility into runtime activities that can signal hidden threats that bypass other security measures. Automated threat investigation, validation, and remediation processes support a fast response to mitigate risk and prevent damaging attacks.

Example use case:

A home services provider interacts with customers using a cloud-native application, which handles sensitive data such as payment information and personal customer details. 

  1. An attacker uses an access control vulnerability to access unauthorized data and escalate privileges for additional services. 
  2. The company’s ADR detects unusual patterns in the application’s runtime behavior, including making unauthorized API calls to access restricted data. 
  3. The tool traces the calls to an endpoint with an IAM misconfiguration. 
  4. To stop the attack, the ADR terminates the malicious session and quarantines the compromised microservice until the security team can fix it. 

Examples of ADRs include Miggo, Oligo, Upwind, and Sweet Security.

 

Runtime application self-protection (RASP)

RASP is an application security technology that developers integrate directly into their code during development or deployment. RASP plays a similar role to ADR—detecting and blocking application-layer attacks. But they operate very differently: 

  • While ADR monitors interactions between applications, APIs, and the broader cloud environment, RASP focuses more narrowly on the runtime of individual applications or serverless functions. 
  • Like ADR, RASP uses behavioral analysis to detect threats based on their activity. Unlike ADR, RASP doesn’t look for static vulnerabilities or predefined signatures. 
  • ADR excels at detecting complex attack patterns across the environment, such as lateral movement or API abuse. RASP is ideal for protecting specific applications or functions from runtime exploits like injection attacks or zero-day threats.

Example use case:

A travel agency runs serverless functions to process customer payments. 

  1. Due to a coding error, one of these functions is vulnerable to a command injection attack. 
  2. During runtime, an attacker tries to take advantage of this flaw—specifically, by injecting shell commands through user input fields—to exfiltrate customer payment data. 
  3. The company’s developers have embedded RASP into the function. The RASP detects this unusual input pattern and immediately blocks the attack by rejecting the request. 

Examples of RASP solutions include Imperva, Contrast Protect, and Aikido Security Platform.

 

API security

API security tools complement ADR and RASP by addressing API-specific threats that can let attackers compromise or move between applications or containers. API monitoring includes:

  • Continuously tracking API usage patterns such as request rates, response times, and data access behaviors.
  • Detecting suspicious activity—such as unauthorized access attempts or unusual usage patterns—that can indicate API abuse.
  • Mitigating attempted attacks through real-time measures such as:
    • Refusing requests.
    • Imposing rate limiting. 
    • Blocking IP addresses.
    • Revoking compromised API keys. 
  • Identifying misconfigurations or other vulnerabilities in API endpoints that attackers could exploit.
  • Discovering overlooked shadow or zombie APIs that pose unnecessary security risks.

Example use case:

An e-commerce company runs cloud-native applications that rely heavily on APIs to manage customer orders, process payments, and update its inventory. 

  1. One day, an attacker uses a compromised API key to access sensitive customer data through an exposed API endpoint. 
  2. They make repeated, unauthorized API requests to exfiltrate large amounts of this data.
  3. The API monitor detects the unusual spike in API requests from an unfamiliar IP address. 
  4. It flags this behavior as unusual and triggers the safeguards described above. 
  5. A log of API activity during the incident includes timestamps, endpoints accessed, payloads sent, and user-agent details. 
  6. Based on these insights, the team implements stricter controls to prevent similar attacks. 

Examples of API security tools include Aikido, Salt Security, Cloudflare, and F5.

 

Cloud access security broker (CASB)

A CASB sits between SaaS apps and their users to enable secure access and monitor user behavior, data interactions, and application usage—and identify and isolate threats. More specifically, a CASB:

  • Uses APIs to monitor and analyze user behavior for anomalies such as unusual login locations or excessive data downloads.
  • Applies data security measures such as encryption, tokenization, and data loss prevention (DLP) to protect data traveling across cloud services.
  • Identifies unauthorized cloud usage, such as unsanctioned SaaS applications, accessed by employees. 
  • Supports compliance by continuously assessing and reporting on cloud security posture. 

Example use case:

An employee at a global consulting firm accidentally uploads a strategic client document to a public folder in Google Drive. The CASB:

  • Identifies the use of a public folder as unusual.
  • Analyzes the document’s content to assess its sensitivity.
  • Flags it as risky.
  • Takes action to mitigate this risk. 

The CASB’s automated response includes: 

  • Removing public access permissions on the file. 
  • Notifying the employee and the company’s security team of the incident.
  • Maintaining an audit trail for the incident to ensure compliance. 

Examples of CASBs include Netskope and Zscaler.

 

Web application firewall (WAF)

A WAF is a standard element of every cloud security toolset. It acts as a security checkpoint between an organization’s web services and the public internet. It monitors and protects HTTP traffic to and from web applications, analyzes incoming requests, and filters or blocks any harmful activities it detects. This includes:

  • Protecting web applications and APIs against threats like SQL injection, cross-site scripting (XSS), and remote code execution. 
  • Applying SSL/TLS encryption to protect data in transit from theft and man-in-the-middle attacks. 
  • Using bot management techniques and attachment scanning to combat spam-borne malware and phishing threats. 
  • Defending against DDoS by detecting abnormal traffic patterns and mitigating potential attacks. 

Example use case:

An e-commerce company uses a website to handle customer transactions and store their saved payment information. 

  1. Attackers attempt to exploit an SQL injection vulnerability in the site’s search tool to gain access to this database. 
  2. Using predefined rules, the WAF: 
  • Detects the SQL commands in these input parameters. 
  • Recognizes the likely attack. 
  • Blocks the request. 
  • Alerts the security team for further investigation and follow-up. 

Examples of WAFs include Check Point, Cisco, Fortinet, and CloudFlare, as well as those provided by major cloud service providers.

 

SaaS security posture management (SSPM) 

SSPM, like other members of the xSPM family—CSPM and KSPM—provides continuous monitoring to identify misconfigurations, excessive privileges, and suspicious behavior for SaaS applications. Organizations can use SSPMs to implement IAM controls, manage SaaS-to-SaaS connections, and ensure the security of integrations between different cloud services. When it detects vulnerabilities, the SSPM can often remediate them automatically or provide guidance for human remediation. 

Example use case: 

An agency uses SaaS applications like Google Workspace and Slack for communication and collaboration. 

  1. Over time, misconfigurations have accumulated—publicly shared files, overly permissive user roles, disabled MFA, and so on—exposing the NGO to potential data breaches and compliance violations. 
  2. Following a security incident, the NGO implements an SSPM to improve its risk profile. 
  3. The tool: 
    • Scans its SaaS applications for misconfigurations. 
    • Evaluates their severity based on organizational policies and regulatory requirements, as well as the specific data and systems involved. 
    • Prioritizes ‌remediation accordingly. 
  4. Moving forward, the SSPM flags such vulnerabilities as they arise, helping the NGO maintain its improved security posture. 

Examples of SSPM tools include Adaptive Shield, and AppOmni.

 

Secure access service edge (SASE)

A type of cloud-native architecture rather than a tool, per se, SASE integrates networking and security services into a unified platform. By adopting SASE, organizations can achieve more-consistent and comprehensive security across users, devices, and applications while giving security teams a single point of management and visibility. SASE typically encompasses security functions that include:

  • Protecting cloud applications by monitoring and controlling access, enforcing data security policies, and detecting and mitigating threats. 
  • Inspecting web traffic to detect malware, filter phishing attacks, and block access to malicious websites. 
  • Securing network traffic across users and locations. 
  • Monitoring data flows to prevent unauthorized sharing or exposure.

Example use case:

A global tech company with a hybrid workforce faces challenges securing the many different scenarios where its employees work—home offices, branch locations, public Wi-Fi networks, and so on. 

  1. A SASE makes it easier for the company to provide secure connectivity to corporate resources through a variety of access points while maintaining consistent security policies and threat protection. 

 

DevSecOps team tools

The tools above focus on securing the applications an organization uses. But in the DevSecOps age, security begins well before developers deliver code to production. DevSecOps teams use their own sets of tools and methods to help prevent vulnerabilities from entering the cloud environment and reduce the risk posed by an attack. 

DevSecOps tools include software composition analysis (SCA), code scanning, infrastructure-as-code (IaC) scanning, software bill of materials (SBOM), scanning in the integrated development environment (IDE), pre-commit scanning, registry and repository security, and pipeline security. 

 

Software composition analysis (SCA)

An organization’s application code base typically includes both third-party code, such as open-source projects and packaged software, and internally developed custom code. SCA tools help DevSecOps teams prevent third-party code from introducing weaknesses into their security posture. 

Embedded into the continuous integration/continuous delivery (CI/CD) pipeline, an SCA can detect vulnerabilities and compliance violations, including exposed secrets, in externally developed code and offer remediation suggestions. This “shift-left” approach can prevent security flaws from reaching production without the delays and costs of later-stage testing and remediation. 

Another key SCA function is to generate software bills of materials (SBOMs) by identifying and analyzing the open-source components and third-party libraries in software applications. 

Example use case:

A DevOps team is building a cloud-native e-commerce application. 

  1. In scanning their code, their SCA tool identifies an open-source JavaScript library that fails to sanitize user input. This could leave the application vulnerable to XSS attacks. 
  2. The tool provides details on the affected dependency, its version, and steps to remediate the flaw by upgrading to a secure version of the library. 

Examples of SCA tools include Snyk, JFrog Xray, and Veracode.

 

Code scanning

Code scanning complements SCA by performing a similar function for internally developed custom code. It can take several forms across the CI/CD pipeline as code is deployed from development to test to production. 

  • Static application security testing (SAST): SAST tools check source code for potential security flaws by reading it without running it, much as a human peer reviewer would. 
    • These flaws can include injection vulnerabilities, XSS, buffer overflows, weak authentication and authorization, input validation errors, and exposed secrets.
    • SAST is highly useful for catching issues during code or build phases, though it’s less effective for detecting runtime vulnerabilities. Examples of SAST tools include Checkmarx and SonarQube.
  • Dynamic application security testing (DAST): DAST, on the other hand, focuses specifically on running applications. By simulating attacks and analyzing responses, DAST can uncover vulnerabilities that’d only come to light at runtime in attacks like XSS, SQL injection, and cross-site request forgery (CSRF). 
    • These vulnerabilities might include input validation problems, session management vulnerabilities, and authentication flaws. 
    • While SAST is a shift-left tool, DAST comes into play later in staging or pre-production environments. Examples of DAST tools include Qualys and Acunetix. 
  • Interactive application security testing (IAST): IAST combines elements of SAST and DAST. Given access to the entire codebase, runtime behavior, and configuration data, IAST tools both analyze source code and monitor the behavior of running applications. Although an IAST tool performs the static analysis function of an SAST, it is typically used later in the pipeline at the testing phase, making it less applicable for shift-left security. Key advantages over DAST include providing greater insight into business logic flaws or insecure dependencies, which might not surface in runtime behavior. By pinpointing the exact location of vulnerabilities as they occur, as well as providing context on their root causes, IAST can also help developers address issues faster. Examples of IAST tools include Contrast Assess and HCL AppScan.

Example use case:

  1. An insurance provider uses IAST to test its web application for vulnerabilities. 
  2. At the testing phase, the tool’s analysis detects hardcoded credentials in the source code, a static vulnerability that SAST might also have flagged. 
  3. At the same time, it also discovers an SQL injection flaw in the application’s login form that only becomes evident when it interacts with the database. This is the kind of runtime vulnerability that DAST would have caught as well. 
  4. The tool identifies the lines of code responsible for each flaw to enable prompt remediation. 

In the case of the static vulnerability, SAST might have enabled earlier-stage detection and remediation. On the other hand, SAST wouldn’t have detected the runtime vulnerability. 

 

Infrastructure-as-code (IaC) scanning

These tools analyze IaC templates and configurations to detect security misconfigurations and compliance violations before deployment. They often use policy-as-code (PaC) to do this. Like many DevSecOps tools, they enable shift-left security by performing these scans early in the CI/CD pipeline to prevent issues sooner—rather than reacting to them later. 

Example use case:

A financial services organization deploys cloud infrastructure using IaC templates. 

  1. A scan of the IaC code file identifies an S3 bucket configured without encryption, which would increase the risk of data exfiltration. 
  2. The tool flags the issue before deployment. 
  3. It then provides a recommendation to add the appropriate encryption configuration to the template. 

Examples of IaC scanners include AWS CloudFormation Guard, Terraform Sentinel, Checkov, and Open Policy Agent (OPA).

 

Software bill of materials (SBOM)

An SBOM is a comprehensive inventory of the open-source and third-party components used in an application. As the definitive source of truth on the app’s software supply chain, the SBOM includes all of the libraries, dependencies, and frameworks it contains—along with metadata on their respective versions, licenses, and vulnerabilities. DevSecOps teams depend on the SBOM to identify and manage potential security risks associated with open-source and third-party components. It does this, in particular, by quickly determining whether newly discovered vulnerabilities are present in any of the company’s applications. 

Example use case:
The discovery of the notorious Apache Log4j (Log4Shell) vulnerability highlighted the critical role of an SBOM. Without such an inventory, companies would have struggled to determine all the places Log4j was present throughout their environments, causing dangerous delays in remediation. The SBOM could provide precise information about where the vulnerable library was in use, and whether it was the specific version of Log4j containing the vulnerability, across all of a company’s codebases. DevSecOps tools can be integrated at multiple points throughout the software development lifecycle, including:

  • In the integrated development environment (IDE).
  • Before code is committed to the repository.
  • Within the registry and repository.
  • For the DevOps pipeline itself.

 

Scanning in the integrated development environment (IDE)

IDEs that provide integrated security scanning tools—such as SAST, SCA, and IaC scanning—help developers identify and fix vulnerabilities in real time as they write code. By embedding security tasks into the developer experience, including recommendations and tools for remediation, these features can improve developer productivity, accelerate releases, and foster a culture of secure development.

DevSecOps capabilities that can be used here include SAST, SCA, and IaC scanning. 

 

Pre-commit scanning

Pre-commit security tools act as a gateway to ensure that only secure, compliant code enters the repository. Running as automated scripts or hooks, they integrate into version control systems like Git to perform tasks such as SAST, secrets scanning, and code quality checks. 

Example use case:

A technology company uses Git pre-commit hooks to keep sensitive information out of its repository. 

  1. A developer inadvertently attempts to commit code containing AWS access keys. 
  2. The pre-commit hook detects this secret and blocks the commit. 
  3. The developer gets an alert with details about the issue and corrects it before proceeding with the code. 

DevSecOps capabilities that can be used here include SAST, SCA, and IaC scanning. 

 

Registry and repository security 

Registry and repository security is a critical element of app development, cloud-native or otherwise. In a cloud context, the security tools provided in a container registry provide visibility and control for the components used in cloud-native app development. This includes: 

  • Providing a centralized, secure location for storing and managing application code, container images, artifacts, and dependencies to ensure that teams use the right versions. 
  • Managing credentials for accessing private registries in DevSecOps pipelines. 
  • Ensuring image integrity through image scanning, secrets scanning, authentication, and digital signing.
  • Automating security testing and updates, including scanning pre-built container images for known vulnerabilities during the build pipeline. 
  • Supporting compliance by enforcing security policies and providing audit trails for container and artifact usage. 

Example use case:

  1. An organization using open-source code needs to reduce the risk of bad actors exploiting vulnerabilities in publicly available components. 
  2. Registry and repository security helps the company prevent vulnerable or compromised container images from putting its production environments at risk.
  3. Its registry automatically scans all container images uploaded to the registry to detect any vulnerabilities and block deployment until the issue is resolved. 

DevSecOps capabilities that can be used here include SAST, SCA, and IaC scanning. 

 

Pipeline security

Pipeline security and code scanning play complementary roles in DevSecOps, but they’re easily confused. To be clear: 

  • Pipeline security provides security of the pipeline, ensuring nobody tampers with code as it moves through the DevOps lifecycle.
  • Code scanning provides security within the pipeline, ensuring developers don’t leave any vulnerabilities in the code as it’s deployed from development to testing to production. 

Let’s take pipeline security tools first. These focus on securing the processes, workflows, and infrastructure used to build, test, and deploy applications. This includes:

  • Securely managing the IaC templates and container images used in the pipeline.
  • Enforcing access controls to maintain least privilege across the pipeline. 
  • Identifying and preventing pipeline security threats posed by exposed secrets such as passwords, API keys, and other credentials. 
  • Isolating development, staging, and production environments to prevent unauthorized code movement and limit the propagation of vulnerabilities. 
  • Preventing unauthorized changes through best practices such as signed commits.

Example use case:

Weak pipeline security appears to have played a key role in the notorious SolarWinds hack.

  1. Threat actors took advantage of a developer’s source code repository to gain access to its build systems.
  2. Once inside, they injected malicious code into a DLL for its Orion software.
  3. The code was then distributed to SolarWinds customers as part of a digitally signed software update.

More effective pipeline security might have helped SolarWinds avoid this highly damaging incident. The tool could have detected and flagged the company’s lack of repository MFA as a high-risk configuration, and provided a recommendation for remediation. 

DevSecOps capabilities that can be used here include DAST, IAST, SAST, SCA, and IaC scanning.

 

Contact us to enable comprehensive visibility, full understanding, real-time threat detection, and rapid response across your cloud environments.