Cloud Native Security Fabric (CNSF)
The missing security layer for the cloud eraWhat is Cloud Native Security Fabric?
Cloud Native Security Fabric (CNSF) is a cloud runtime security control layer built inside the cloud network, not at the edge. It enforces Zero Trust between every cloud workload by inspecting, segmenting, and controlling workload-to-workload and workload-to-internet communications across regions, accounts, clouds, and data centers.The Vision
CNSF is the missing fabric-level control layer for the cloud era. A standard way to declare, enforce, and prove trust between workloads in real time, everywhere they run. This isn’t just a new category. It’s a return to first principles in a cloud era that’s often prioritized speed over security. By embedding trust directly into the fabric of the cloud, CNSF defines the control layer that Zero Trust has lacked since workloads left the data center.The Question: The question isn’t whether Cloud Workloads need a security
fabric—the breaches prove they do. The question is whether you’ll build it
proactively or reactively. The cloud won’t wait, and neither will the
adversaries exploiting the gaps we’ve left behind.
The Problem CNSF Solves
The fortress is dead. For two decades, cybersecurity was defined by walls, perimeters, and the illusion of inside versus outside. But the cloud didn’t just move the perimeter, it vaporized it.Shattered Perimeter
Modern applications are distributed across thousands of micro-perimeters:
VPCs/VNets, clusters, functions, and services
Implicit Trust Gap
Most tools watch from the outside while attacks spread inside through
implicitly trusted east-west communication paths
Internet as Enterprise Network
Sensitive inter-service communication now routinely traverses public
infrastructure previously considered hostile territory
Ephemeral Architecture
Applications are transient ecosystems of short-lived components creating
constantly evolving attack surfaces
The New Reality
Three irreversible shifts have fundamentally broken traditional security models:- The Internet Became the Enterprise Network: What was once your controlled internal network and the external internet have merged
- The Perimeter Became Exponentially Distributed: Attack surface has atomized into thousands of individual points requiring defense
- Applications are Ephemeral and Deeply Distributed: Transient ecosystems of containers, functions, and services with intricate, temporary dependencies
Critical Fact: 25% of data breaches involve lateral movement, with hackers
spending weeks or months silently moving between systems. The space between
workloads has become the new primary battleground.
Why CNSF is Different
Unlike traditional security approaches that bolt on protection after the fact, CNSF is fundamentally different in four critical ways:Inline Enforcement
Real protection happens where packets flow- Controls applied in the data plane—the actual forwarding path
- Policy enforced in real time, not just declared
- Line-rate performance with predictable latency
Agentless & Embedded
Security woven into the fabric, not bolted on- No agents to deploy or manage
- Lives in the data path by design
- Travels with workloads across environments
Multi-Cloud Consistency
Express intent once, enforce everywhere- Same policy produces same results across AWS, Azure, GCP, OCI
- Abstracts cloud provider differences
- Uniform enforcement across hybrid environments
Developer-Ready
Fits existing workflows- Deep Terraform and IaC integration
- No application code changes required
- Preserves development velocity
Core Capabilities
Identity-Aware Segmentation
- Define who/what can communicate based on labels, identity, and context
- Stop lateral movement with deny-by-default policies
- Dynamic trust boundaries that adapt to infrastructure changes
Egress Governance
- Explicit allow-lists for approved SaaS/ERP and external services
- Eliminate common data exfiltration paths
- Monitor and control outbound communications
Inline Encryption & High-Performance Transport
- Protect data in motion across sites, regions, and clouds
- Quantum-resistant encryption for future threats
- Deterministic performance across multi-cloud topologies
Kubernetes & Cloud-Native Coverage
- Consistent fabric-level policy for east-west pod/service traffic
- Secure ephemeral container communications
- No application rewrites required
How CNSF Works
Control Plane
Captures intent (segments, trust zones, egress rules) and programs the
fabric consistently across environments
Data-Path Enforcement
Applies policy inline where workloads actually communicate—between services,
VPCs/VNets, clusters, and on hybrid links
Context Signals
Identity, posture, and labels refine decisions dynamically, keeping policy
accurate as infrastructure changes
The Accelerants: K8s and GenAI
Two Board-mandated initiatives are exponentially increasing the urgency for CNSF:Kubernetes Complexity
- 96% of enterprises use Kubernetes with complex, ephemeral networking
- Securing east-west traffic between thousands of pods
- Consistent policy across multi-cluster deployments
Generative AI & “Shadow AI”
- Autonomous agents and AI-powered tools proliferating within environments
- AI systems designed to pull data from anywhere and communicate extensively
- New communication patterns bypassing traditional controls
CNSF in the Security Ecosystem
CNSF doesn’t replace your security stack—it activates it where existing tools can’t reach: CNAPP & Posture ToolsThey find misconfigurations; CNSF enforces cloud runtime communication policies derived from those insights Endpoint/XDR
They protect hosts; CNSF protects the paths between hosts and services SASE/Zero Trust Access
They govern user-to-app; CNSF governs service-to-service and workload-to-internet after access is granted NGFWs
They provide ingress/egress defense; CNSF extends Zero Trust inside the cloud runtime fabric
Measurable Outcomes
Lateral Movement
Deny-by-default segmentation prevents unauthorized movement between
workloads
Data Exfiltration
Governed egress and encrypted paths eliminate common data loss vectors
Audit Time
Uniform policy, evidence, and trust-zone visibility across all clouds
Operational Drag
Standardized controls that move with workloads and align to DevOps/IaC
Key Use Cases
- Enforce Zero Trust for cloud workloads across multiple CSPs and regions
- Govern and monitor egress to external services/SaaS to prevent data loss
- Segment Kubernetes services/pods without application rewrites
- Secure hybrid communications (data center ↔ cloud) with consistent policy
- Control GenAI/agentic systems communications safely
Zero Trust Alignment
CNSF directly supports the core pillars of the CISA Zero Trust Maturity Model:- Network: Dynamic segmentation and encrypted communications
- Application: Service-to-service trust enforcement
- Data: Protection of data in motion between workloads