The hidden gaps in your cloud security fabric

The cybersecurity landscape has undergone a seismic shift. As enterprises race to adopt multicloud architectures, containerized applications, and artificial intelligence, the traditional perimeter-based approach to security is proving dangerously outdated.

What used to be internal traffic within a protected data center now moves across public infrastructure, often without adequate visibility or control. In this new reality, organizations are increasingly blind to the vulnerabilities within their own cloud environments.

Many companies experience difficulties integrating cloud firewalls into their broader security strategies. And many more struggle to monitor and secure east-west traffic—lateral movement of data between cloud-native applications—leaving significant gaps that attackers can exploit.

Perhaps most alarming: many enterprises have almost no control over egress traffic, the very channel attackers most often use to establish command and control communications once they’re inside and abuse for data exfiltration.

The Expanding Attack Surface

These gaps stem from a fundamental misunderstanding of where risk now resides. Security models still rooted in the idea of a hardened outer shell fail to account for today’s atomized, dynamic, and decentralized environments.

Every virtual private cloud (VPC), Kubernetes cluster, ephemeral container, and API endpoint now acts as a potential entry point.

This explosion of mini-perimeters means that what once constituted a single attack surface has now fractured into thousands, or even hundreds of thousands, of potential vulnerabilities.

The adoption of technologies like Infrastructure as Code (IaC), AI, and containerization has introduced speed and scalability into enterprise environments. But it has also outpaced the ability of many security teams to monitor and govern deployments effectively.

The rapid rise of employee-led AI initiatives, often deployed outside formal IT governance, further complicates matters by creating data pathways that evade traditional controls.

In parallel, multicloud strategies introduce architectural complexity. Each cloud provider has unique tooling, policies, and configurations, forcing security teams to juggle inconsistent frameworks across environments.

This fragmentation creates blind spots, especially at the communication points between workloads in different clouds, where consistent policy enforcement is nearly impossible.

What was once a clearly defined boundary has become a porous mesh of unmonitored connections. In many cases, east-west traffic is still implicitly trusted, despite its growing role in enabling lateral movement during attacks.

And egress traffic, the outbound path workloads take to the internet, is often wide open by default.

For example, a VM in Azure typically spins up with unrestricted outbound internet access. Internet access means that anyone with an internet connection can find and communicate with that workload.

These workloads represent opportunities for attackers to lodge themselves where they can patiently study the environment, gain additional privileges, and begin to move laterally, eventually inserting dangerous malware or quietly siphon data out.

Rethinking the Cloud Security Fabric

The traditional approach to internet security, building walls at the edge isn’t applicable to enterprise cloud environments. Instead, organizations must adopt a model that embeds security directly within the network fabric of the cloud.

This inside-out approach focuses on the actual communication paths between workloads, rather than mythical cloud perimeter defenses that are increasingly easy to bypass.

This emerging concept, pioneered and referred to by Aviatrix as cloud native security fabric (CNSF), reimagines security as a distributed enforcement layer that travels with workloads and adapts in real-time to changes in topology.

Even more importantly, it uniformly addresses the very different generations of workloads that typically exist across enterprise landscapes: “VM tethered” monolithic apps that were lifted and shifted to the cloud as well as modernized applications built utilizing the much more efficient and ephemeral Kubernetes and serverless approaches.

Key principles of this approach include:

Embedded Security: Enforcement policies and controls are implemented within the infrastructure itself, not applied from an external network.

Dynamic Segmentation: Security policies adapt as workloads spin up, down, or shift locations with intent-based policies.

Identity-Aware Controls: Access decisions are based on workload identity and context, even for encrypted communications.

Egress Visibility and Control: Outbound traffic to the internet is inspected and governed, closing a critical blind spot for data exfiltration.

Frictionless Enforcement: Security mechanisms operate in real-time without hindering development velocity.

This shift doesn’t mean abandoning existing security tools but rather enabling them to reach areas of the environment they currently miss. By embedding enforcement into the cloud fabric, insights from monitoring tools can translate into immediate, automated action, closing the gap between detection and response.

The Path Forward

The implications for enterprise security teams are clear: either evolve or fall further behind. Cloud environments demand security models that are just as scalable, dynamic, and distributed as the workloads they support.

Organizations must shift their focus from guarding the edges to securing the connective tissue between services.

That means:

– Prioritizing east-west traffic monitoring and segmentation.

– Eliminating implicit trust between cloud workloads.

– Enforcing visibility and control at the egress perimeter.

– Embedding enforcement capabilities directly into cloud infrastructure.

– Treating security not as a gatekeeper but as an enabler of speed and innovation.

The battlefield has moved. The biggest threats no longer sit at the front gate; they lie hidden between workloads, and in the unmonitored outbound traffic that attackers exploit.

Enterprises that continue to rely on outdated models are not just behind; they’re blind to the risks that may impact them the most.

Check out our feature on the best IT infrastructure management services.

Read more @ TechRadar

Latest posts

The ‘mad rush’ to install solar panels before tax credits run out

Ed Murray has been in the solar business long enough to remember the bloodbath of 1985. That's when President Ronald Reagan ended Jimmy Carter-era...

Dyson’s new wet floor cleaner improves on the last one in these 3 big ways – I can’t wait to try it properly

Dyson Clean+Wash Hygiene is a new wet floor cleaner, joining the WashG1 It's one of the most lightweight wet cleaners on the marketThere are...

I’ve been using Dyson’s new ultra-light vacuum for two weeks – these are the pros and cons so far

The Dyson PencilVac is the most unusual looking vacuum I've seen. It's also one of the most genuinely innovative. The USP here is that...

The OnePlus Turbo has been teased – and it might include an astonishingly big battery

OnePlus has announced the OnePlus Turbo seriesDetails are light, but these sound like they might be gaming phones with great battery lifeLeaks suggest they...

Team Cherry details Hollow Knight: Silksong expansion and a Switch 2 Edition of the original Hollow Knight

Hollow Knight: Silksong's first free expansion is in developmentHollow Knight Nintendo Switch 2 Edition is also in the worksSilksong has, as of now, sold...

How to watch Australia vs England on Sling TV: live stream Ashes 3rd Test cricket

Live stream The Ashes 3rd Test on Willow TV via Sling TV in the USUnblock your stream with NordVPN (75% OFF)3rd Test: December 17-21,...

French government hit by cyberattack – Interior Ministry confirms email systems hit

French Interior Ministry hacked, exposing email servers and internal filesThe extent of any data theft still unknownAPT28 suspected, due to past targeting of French...

This week’s camera deals are even better than Black Friday — Nikon, Sony, Canon, and others are at record-low prices

Thinking about picking up a new camera for Christmas? It's not a bad idea to consider the last-minute sales this week, as several retailers...

The days of the em dash being a ChatGPT giveaway are over — it’s time to bring it back

ChatGPT loves the em dash ( — ) the way a Labrador loves a tennis ball — enthusiastically, indiscriminately, and with absolutely no sense...

So long Google dark web report – I’d never even heard of you

Google's dark web report tool is being shut downThe tool will be inaccessible from February 16 2026It was only launched last year, so clearly...