# Cloud-Native-Application-Security-Top-10 **Repository Path**: mirrors_OWASP/Cloud-Native-Application-Security-Top-10 ## Basic Information - **Project Name**: Cloud-Native-Application-Security-Top-10 - **Description**: No description available - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2020-08-19 - **Last Updated**: 2023-08-18 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # OWASP Cloud-Native Application Security Top 10 ## Overview Cloud native technologies empower organizations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, cloud functions (serverless), service meshes, micro-services, immutable infrastructure, and declarative APIs exemplify this approach. Cloud-Native Applications is a fundamentally new and exciting approach to designing and building software. However, it also raises a completely new set of security challenges. For example, when you move to a microservice model, end-to-end visibility, monitoring and detection become more complex and difficult to execute. The primary goal of this document is to provide assistance and education for organizations looking to adopt Cloud-Native Applications. The guide provides information about what are the most prominent security risks for Cloud-Native applications, the challenges involved, and how to overcome them. ## Table of Contents * Forward * Introduction * Release notes * Overview of Cloud-Native Applications * The shared model of security responsibility * Application security challenges in Cloud-Native applications * Overview of the Top 10 * Top 10 (TBD) * What's next sections * Methodology & data * Acknowledgements