2023 Cloud Native Security and Usage Report
2023 Cloud Native Security and Usage Report
Cloud‑Native
Security and
Usage Report
Table of Contents
01 Executive Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 03
07 Methodology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
08 Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
01 Executive Summary
For the past six years, we have shared an analysis of our real-world customer data to provide the
community with insight into changing container usage and security trends. This report is based on
data gathered from billions of containers, thousands of cloud accounts, and hundreds of thousands of
applications that our customers operated over the course of the last year. This allows us to report on
many different aspects of actual usage of containers and cloud, rather than rely on survey results.
The two biggest cloud security risks continue to be misconfigurations and vulnerabilities, which they
are being introduced in greater numbers through software supply chains. We dove deep into this data
for the 2023 issue of the report because it lands on the priority list of all security leaders. Unfortunately,
87% of container images running in production have a critical or high severity vulnerability. Despite
increased adoption of shift-left security strategies to assess code early and often, organizations need
runtime security. This is evidenced by the tremendous growth in the adoption of technologies like Falco,
a Cloud Native Computing Foundation (CNCF) open source project, that helps organizations detect
runtime threats across clouds, containers, hosts, and Kubernetes environments.
Our findings provide signs of hope for overburdened developers, as the data showed opportunities
to focus remediation efforts on vulnerable packages loaded at runtime. Only 15% of high or critical
severity vulnerabilities with an available fix are actually in use at runtime. Prioritization based on
filtering by in use packages enables teams to significantly reduce cycles spent chasing an endless pile
of vulnerabilities.
It brings us great pleasure to present the Sysdig 2023 Cloud-Native Security and Usage Report. This
information can be useful for determining the real-world state of security and usage for container
and cloud environments. The data can also help inform cybersecurity strategies and priorities. We
are confident these insights can help teams, regardless of their company’s size or stage in their
cloud journey.
Key Trends
- Michael Bourgault,
IT Security Manager, Arkose Labs
Sysdig 2023 Cloud‑Native Security and Usage Report Organizations Struggle to Manage Supply Chain Risk 5
87% of images have high or critical vulnerabilities
High-profile vulnerabilities and
exploits, such as Log4Shell and
Text4Shell, along with increased
guidance from government
organizations regarding
cybersecurity, have caused many
teams to heighten their focus on
application security testing. Even
with these high-profile vulnerabilities, there is little evidence of real progress in addressing this risk. A
shocking 87% of images include a high or critical vulnerability, up from the 75% we reported last year.
When you view the data by number of vulnerabilities in images as opposed to number of vulnerable
images, 71% of vulnerabilities have a fix available that has not been applied. Keep in mind, some
images have more than one vulnerability. Organizations are aware of the danger, but struggle with the
tension of addressing vulnerabilities while maintaining the fast pace of software releases.
Sysdig 2023 Cloud‑Native Security and Usage Report Organizations Struggle to Manage Supply Chain Risk 6
There are a number of inputs commonly used to prioritize vulnerability remediation work, which include:
• Common Vulnerability Scoring System (CVSS) – specifies the severity of a known issue
• Exploitability – indicates if there is a known path for exploiting the vulnerability
• Fixable – identifies if there is a fix available to address the vulnerability
Addressing running, vulnerable packages with a known exploit should be the top priority. We found
that our customers are proactive in fixing vulnerabilities that are exploitable and in packages loaded
at runtime. When we combine multiple criteria of a vulnerability (fix availability, exploitability, and
presence in a package loaded at runtime), what remains is 2% of the vulnerabilities found in the
25,000 images we analyzed.
When exploitable vulnerabilities must remain in your environment, one way security teams can
ease the pain and reduce the risk of compromise is by implementing runtime security detections.
Runtime protection is often powered by rules, but it should also employ a multi layered approach
that incorporates behavior anomaly detection and AI or ML-based detection. This approach improves
detection and mitigation of zero-day exploits and yet-unknown threats. Runtime protection mechanisms
can also be tuned to detect novel threats that target vulnerable workloads in the unique environments
of organizations. Detections can also be augmented with threat intelligence from threat research teams
and regularly updated as new information or findings about behaviors become available.
Fewer than 1% of
JavaScript
packages are in
use at runtime
Ideally, an image should only consist
of the code necessary to do its job.
Pre‑packaged and open source images
may include packages that are not
required for your application. This is
known as image bloat. Security teams
can reduce their total number of
vulnerabilities by removing the amount
of unnecessary and unused packages
that are often seen in third‑party images.
Sysdig 2023 Cloud‑Native Security and Usage Report Organizations Struggle to Manage Supply Chain Risk 7
We looked at the package types of more than 6.3 million running images to determine the four most
commonly used package types. Then, we analyzed those images to identify the types of packages that
have the most bloat. JavaScript packages are found in the greatest number, yet fewer than 1% of them
are loaded at runtime. This is a top candidate for removal to reduce bloat, and therefore, can also
provide the greatest reduction in the number of vulnerabilities to fix.
Although it takes time to slim down images, doing so will reduce image scanning time and the
number of vulnerabilities. Time spent streamlining packages and images ultimately results in time
savings for delivery and runtime. Costs are amplified when you consider the cloud infrastructure costs
and resources that need to be dedicated to running bloated workloads. To minimize image bloat, only
include necessary packages, use an optimal base image, combine instructions and use multi‑stage
builds, and ensure you list the files you need in the COPY step.
Sysdig 2023 Cloud‑Native Security and Usage Report Organizations Struggle to Manage Supply Chain Risk 8
Base image OS selection can reduce bloat by 98%
Most people use a base image because it’s easier than creating your own. Taking a look at
our customer usage, we see that Red Hat Enterprise Linux (RHEL), which includes the Red Hat
UBI (Universal Base Image), is by far the most popular at 46% of base images. This is up 10%
year‑over‑year. This may be because RHEL has a long history of usage in the enterprise, and would be
an easy choice as organizations move to cloud‑native workloads. Interestingly, only 16% use Alpine,
a lightweight Linux distribution.
This is down from 25% last
year. According to crunchtools,
the size of the standard
uncompressed UBI image is
228MB and the Alpine image is
5.7MB. By using slimmed‑down
base images like Alpine,
organizations can debloat their
container environment by 97.5%
and thereby reduce their attack
surface. This will also reduce the
number of OS vulnerabilities to
fix, as only 8% of vulnerabilities
are in OS packages loaded at
runtime.
Sysdig 2023 Cloud‑Native Security and Usage Report Organizations Struggle to Manage Supply Chain Risk 9
03 Zero Trust: Lots of
Talk, Little Action
Vulnerabilities are only one part of the cloud security story. Misconfigurations are still the biggest
player in security incidents and, therefore, should be one of the greatest causes for concern in
organizations. According to Gartner®, “By 2023, 75% of security failures will result from inadequate
management of identities, access, and privileges, up from 50% in 2020.” [1] Although many
organizations are talking about zero trust principles, such as enforcing least privilege, our data shows
little evidence of action.
1 Gartner, Best Practices for Optimizing IGA Access Certification, Gautham Mudra, 4 April 2022. Gartner is a registered trademark and service
mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
Sysdig 2023 Cloud‑Native Security and Usage Report Zero Trust: Lots of Talk, Little Action 10
58% of identities are non‑human roles
Sysdig’s year‑over‑year analysis implies that our customers are either granting access to more
employees or maturing their Identity and Access Management (IAM) practices. The former scenario,
a growth in human user population, may simply be a byproduct of moving more business into cloud
environments or ramping up staffing due to business growth. Organizations may be maturing in their
identity and access management practices by reducing the number of machine identities needed to
run systems that must then be secured and maintained.
Sysdig 2023 Cloud‑Native Security and Usage Report Zero Trust: Lots of Talk, Little Action 11
16% of users have strong best practices for accounts
Last year, we saw that 27% of
Sysdig customers were using
their cloud environment’s root
user account for administrative
and daily tasks. Cloud security
best practices and the CIS
Benchmark for AWS indicate
that organizations should avoid
doing so and suggest creating
dedicated roles with limited,
yet appropriate permissions for
performing administrative tasks.
Sysdig 2023 Cloud‑Native Security and Usage Report Zero Trust: Lots of Talk, Little Action 12
04 Mature Organizations
Are Proactively Testing
Their Security Posture
The prevalence of unpatched vulnerabilities, overprovisioned identities, and risky configurations
highlights the need to detect anomalous behavior and immediately investigate potential threats.
Sysdig 2023 Cloud‑Native Security and Usage Report Mature Organizations Are Proactively Testing Their Security Posture 13
The Sysdig Threat Research Team (Sysdig TRT) builds Falco rules based on automated threat feeds,
manual analysis of open source, and data gathered from their managed honeynet. Any detection rules
should be regularly tuned by your vendor to adjust to the ever‑changing threat landscape, and be
personally tuned based upon your own activity that may cause false positives.
For example, the Sysdig TRT regularly updates the out‑of‑the‑box rules Outbound Connection to C2
Servers and Malicious Filenames Written with known and new nefarious activity. In addition, we see
our customers focus on capturing log activity related to persistence and privilege escalation rules.
A small number of our customers are even modifying and customizing out‑of‑the‑box Falco rules
provided by Sysdig, an indication of their security maturity as they improve their detections and
reduce false positives.
Anomaly detection
Sysdig 2023 Cloud‑Native Security and Usage Report Mature Organizations Are Proactively Testing Their Security Posture 14
72% of containers live fewer than five minutes
The container lifespan was
already short, with nearly half of
containers living fewer than five
minutes in past years. However,
this year, the number increased
to more than 70% of containers
living less than five minutes. This
is a big jump and reinforces
the need for continuous threat
detection and to capture a
record for investigations, as
the container may live for only
seconds. There is no way for
us to know for sure, but we
speculate that companies are
becoming more efficient as they
mature and are using containers
to run more short‑lived functions
similar to how you might use a
serverless environment.
Why do containers have such a short life? Many containers only need to live long enough to execute
a function and then terminate when it’s complete. Seconds may seem short, but for some processes,
it’s all that is required. The ephemeral nature of containers remains one of the technology’s unique
advantages, in that container images are designed to change as needed. However, it also presents
issues to consider for monitoring, security, and compliance because many tools can’t report on entities
that no longer exist.
Sysdig 2023 Cloud‑Native Security and Usage Report Mature Organizations Are Proactively Testing Their Security Posture 15
05 Millions Wasted on Unused
Kubernetes Resources
In an ephemeral, dynamic environment
like Kubernetes, keeping track of cost and
usage is inherently difficult. Organizations
often neglect to set limits on how many
resources a container can use. In addition,
environments where developers are allowed
to choose their own capacity needs can
lead to overallocation and these are rarely
audited and right sized. In looking across
the customers in our largest region, we
found that 59% of containers had no CPU
limits defined and 49% had no memory
limits defined. In terms of unused resources,
an average of 69% of requested CPU cores
and 18% of requested memory were unused.
Sysdig 2023 Cloud‑Native Security and Usage Report Millions Wasted on Unused Kubernetes Resources 16
06 Usage Trends and Insights
Continuous development
and image lifespans
Containers are a perfect companion to the
agile movement, accelerating the development
and release of code, often as containerized
microservices. Our image lifespan data reflects
the shift in the time between code releases and
the reality that CI/CD pipelines are helping
developer teams deliver software updates at a
faster cadence than ever before. The data shows
that about half of container images get replaced,
also known as churn, in a week or fewer. For most,
if not all, of today’s businesses, speed to market
matters and makes all the difference in maintaining
competitiveness. Code is being deployed more
frequently, which creates new container images.
Containers give businesses what they need to turn
great ideas into reality, fast.
Service lifespan
Services – the functional software components
of our applications like database software, load
balancers, and custom code – are continuously
being improved. However, at the same time, it’s
important to keep services up and running around
the clock to be able to meet customer expectations.
The data show that service lifespans have remained
relatively consistent compared to last year.
Sysdig 2023 Cloud‑Native Security and Usage Report Usage Trends and Insights 17
Container registries
Container registries provide
repositories for hosting and
managing container images.
This year, we saw the adoption
of Red Hat and IBM registries
both double in usage. Quay and
Docker use has reduced slightly
to a combined 42% of customer
adoption.
Image scanning
Whether the container images originate from private or public registries, it is critical to scan them and
identify known Common Vulnerabilities and Exposures (CVE) prior to deploying into production. We
assessed all the images our customers deployed for OS and non‑operating system vulnerabilities. We
found that OS packages have fewer flaws than non-OS packages, likely due to the fact that they are
usually supported and maintained by industry vendors.
OS vulnerability snapshot
We noticed that 3% of OS vulnerabilities
are high or critical, relatively unchanged
from last year. Although this may seem
low, if an OS vulnerability is exploited,
it can compromise your entire image
and bring down your applications.
Additionally, OS vulnerabilities can have
a very large blast radius because many
different workloads are affected at the
same time.
Sysdig 2023 Cloud‑Native Security and Usage Report Usage Trends and Insights 18
Non‑OS vulnerability
snapshot
What many teams don’t check for are
vulnerabilities in third‑party libraries,
likely under the presumption that a
package released by someone else
has been secured and is regularly
maintained. We found that 52% of
non‑OS packages have high or critical
severity vulnerabilities, only a slight
reduction from last year. Developers
might be unknowingly pulling in
vulnerabilities from non‑OS open source
packages, like Python PIP or Ruby Gem,
and introducing security risk. Gaining visibility into third‑party dependencies and determining whether
they are truly exploitable has always been a challenge, but runtime context enrichment can enable
actionable prioritization of these types of flaws.
A likely reason scanning in runtime is still so high is due to the use of third‑party software downloads
from vendors. These are typically considered trusted sources, so DevOps teams may presume the
images are secure and save the
time and effort of scanning in
the CI/CD pipeline, skipping to
scanning in runtime. However,
as a friendly reminder in the
spirit of “shifting left,” it is
best to scan images in the CI/
CD pipeline to ensure security
prior to deployment. The slight
year‑over‑year decrease in
runtime scanning tells us that
either the “shift left” is starting
to happen, or organizations
are maturing and moving from
vendor‑provided images to
custom‑built images.
Sysdig 2023 Cloud‑Native Security and Usage Report Usage Trends and Insights 19
Containers and Kubernetes
Each year, we take a look at details specific to the count and activity around containers and
Kubernetes, including density and lifespans. This provides insight into the rate of adoption, but also
illustrates the scale and efficiencies being achieved. In this section, we also answer questions like:
How many clusters are customers operating? How many pods run per node? How much capacity
does a cluster use? We look at a range of details about what customers are doing with Kubernetes.
Because Sysdig automatically collects Kubernetes labels and metadata, we’re able to provide
cloud‑native context for all of the data insights we discover, from performance metrics and alerts to
security events. This same capability enables us to capture each of the following usage metrics from
the cluster all the way to pods and containers, all with a simple query.
Container density
Over the past six years, the
median number of containers
per host increased in every
report. This year, that number
jumped again by 24%
year‑over‑year to an average
of 57. It is possible that
organizations are learning how
to be more efficient by either
using larger instance sizes or
smaller containers. While the
primary goal of containers is
to speed development and
deployment, many organizations
are benefiting from increased
utilization of hardware resources
thanks to container efficiencies.
Sysdig 2023 Cloud‑Native Security and Usage Report Usage Trends and Insights 20
Kubernetes clusters and nodes
Some customers maintain a few large clusters, while others have many clusters of varying sizes. The
charts in this section show a distribution of cluster count and nodes per cluster for users of the Sysdig
platform. The large number of single clusters per customer, and relatively small number of nodes, is
an indication that many enterprises are still early in their use of Kubernetes. We’ve also recognized
that the use of managed Kubernetes services in public clouds is another factor that impacts these data
points. This year, we observed a shift towards fewer large clusters overall and more nodes per cluster.
This may indicate that cloud‑native deployments are starting to mature by utilizing resources more
efficiently.
Sysdig 2023 Cloud‑Native Security and Usage Report Usage Trends and Insights 21
Kubernetes namespaces, deployments, and pods
Namespaces
Kubernetes namespaces provide
logical isolation to help organize
cluster resources between
multiple users, teams, or
applications. Kubernetes starts
with three initial namespaces:
default, kube‑system, and
kubepublic. How namespaces
are used varies across
organizations, but it is common
for cloud teams to use a unique
namespace per application.
Deployments per
namespace
Deployments describe the
desired state for pods and
ReplicaSets, and help ensure
that one or more instances of
your application are available
to serve user requests.
Deployments represent a set
of multiple, identical pods with
no unique identities, such as
deployments of NGINX, Redis,
or Tomcat. The number of
Deployments per namespace
provides an idea of how many
services compose our users’
microservices applications.
Sysdig 2023 Cloud‑Native Security and Usage Report Usage Trends and Insights 22
Pods
Pods are the smallest deployable
object in Kubernetes. They
contain one or more containers
with shared storage and network,
as well as a specification for how
to run the containers.
Sysdig 2023 Cloud‑Native Security and Usage Report Usage Trends and Insights 23
Containers, images, and alerts
Containers‑per‑organization
To get a sense of the scale at
which enterprises are currently
operating, we looked at the
number of containers each
customer runs across their
infrastructure. 61% of customers
run more than 250 containers.
At the high end, only 6% of
customers are managing more
than 5,000 containers. DevOps
and cloud teams report that once
the benefits are proven, adoption
accelerates as more business
units look to onboard to the new
platform. However, this year
showed movement toward an
overall increase in the number
of running containers. This shift
may indicate that either more
workloads are moving to containers and away from traditional architectures, or that the infrastructure is
increasingly efficient and able to handle the growing number of containers.
Sysdig 2023 Cloud‑Native Security and Usage Report Usage Trends and Insights 24
Alerts
Analysis of trends with the types of alerts set by our customers helps us understand the kind of
conditions that our users identify as having the most potential for disruption to their container
operations.
Alert channels
We looked at the communication channels users have configured to receive alerts. The use of
Slack increased this year, growing from 36% a year ago to 43%. It’s likely that Slack is being used
for non‑critical alerts handled during
normal work hours, while solutions like
PagerDuty are being used for “waking
people from bed.” The shift to remote
work could have played a role here, as
Slack usage in general has increased
due to this growing trend. The use of
webhooks also grew from 14% last year
to 24% this year. As work environments
change, new tools are likely to be
adopted which would increase the use of
webhooks when there are no integrations
already built for those new tools.
Sysdig 2023 Cloud‑Native Security and Usage Report Usage Trends and Insights 25
There are a number of alerts that don’t have a notification channel configured, but this isn’t necessarily
a bad thing. This could be because the alert was for informational purposes only, or because the
Sysdig platform itself provided enough information to satisfy the demands of the alert in question.
Custom metrics
Custom metric solutions give developers and DevOps teams a way to instrument code to collect
unique metrics. This approach has become a popular way to monitor applications in production cloud
environments, along with tracing and log analysis. Of the three mainstay solutions, JMX, StatsD, and
Prometheus, Prometheus maintained a strong lead with slight growth to 89% of all custom metrics
collected. StatsD fell by half, from 13% to only 6%, while JMX metrics stayed about the same. As
the use of new programming
frameworks expands, alternatives
like JMX metrics (for Java
apps) and StatsD continue to
decline. It is clear that with the
strong connection between
Prometheus and Kubernetes,
more organizations are adopting
Prometheus metrics as they
move toward cloud‑native
architectures.
Sysdig 2023 Cloud‑Native Security and Usage Report Usage Trends and Insights 26
07 Methodology
The data in this report is derived from an analysis of more than seven million containers that our
customers are running on a daily basis. We also pulled from public data sources like GitHub, Docker
Hub, and the CNCF. The data originates from container deployments across a wide range of industries
with organizations ranging in size from mid‑market to large enterprise. Anonymized customer data was
analyzed across North and South America, Australia, the EU, UK, and Japan.
Our research demonstrates that although there is awareness of required tools and the benefits of
zero trust approaches, cloud security processes still lag behind the fast pace of cloud adoption.
From the real‑world customer data we examined, there are several security practice areas that require
improvement to reduce risk:
• Identity and access management: The large disparity between permissions granted vs. those
required highlights the urgent need to regularly measure and manage permissions to reduce
opportunities for attack.
• Vulnerability management: With a majority of container images running with risky
vulnerabilities in production, teams must address image bloat and focus their remediation efforts
by prioritizing vulnerabilities based on real runtime risk.
• Detection and response: Privilege escalation and defense evasion attacks are top of the threat
list for our customers. To stay ahead of the evolving threat landscape, threat detection rules
should be regularly updated to spot nefarious activity.
Beyond security, this year’s data demonstrates the opportunity for organizations to reduce cloud costs
by addressing unused Kubernetes resources. Time invested in capacity planning can yield a strong
return. By implementing proper container resource limits and continuous monitoring, organizations
will be able to keep costs in check without risking application performance.