Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How Observability Practices Improve Traditional Security Efforts
Cybersecurity

How Observability Practices Improve Traditional Security Efforts

Bill DoerrfeldBy Bill DoerrfeldSeptember 7, 2022Updated:April 13, 20234 Mins Read
Facebook Twitter LinkedIn Email
Security Observability
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Today’s software ecosystems are complex, distributed, and full of countless dependencies. When something goes haywire, getting to the core reason behind an incident can take a lot of guesswork. This is where security observability comes in.

Observability tools combine logs, performance metrics, and traces to help engineers paint a more accurate picture of what’s occurring behind an issue. Observability is the latest trend in DevOps, and for a good reason — quickly remediating failures can lead to increased reliability, safety, and customer happiness.

Now, some proponents argue that an organization’s cybersecurity footing should ideally possess a similarly high degree of observability that goes beyond the opaqueness of most vulnerability scanning processes. The idea is that more intelligent metrics into the severities around each exploit would equate to more predictable and reliable systems.

I recently met with Sandeep Lahane, CEO of Deepfence, to explore what security observability entails. According to Lahane, porting the tenants garnered from the ongoing observability movement to security can have a net positive effect, reducing false positives, and decreasing mean time to resolutions.

What Is Security Observability?

In general, observability goes beyond traditional application performance monitoring (APM) processes to collect cues that provide a deeper understanding of how an application behaves. For example, a Site Reliability Engineer (SRE) might follow logs and traces to perform root cause analysis after an incident occurs. Observability can be thought of as the “ability to infer an internal state and integrity of a system by looking at outward cues,” describes Lahane.

However, if we consider cybersecurity, to date, the practice has not yet developed a parallel to observability. This issue was apparent during Log4j, as it became challenging to precisely understand which applications were affected. “A lack of visibility and observability makes things impossible to predict,” explained Lahane. “You could look at logs, but you really need something more real-time and cybersecurity-specific.” Complicating the matters, cybersecurity signals are typically exchanged in a different format, compared to other telemetry data, he adds.

Although scanning for Common Vulnerabilities and Exposures (CVEs) or GitHub Security Advisories (GHSA) is common practice, it can only go so far. “The more you scan, the more you find,” said Lahane. Many new vulnerabilities are found each and every day, which can lead to an inundation of false positives.

Four Pillars of Security Observability

Thus, the key to developing a more actionable security response is utilizing security scanning strategies that are more aware of the runtime context. In this context, vulnerability alerts could be prioritized, thus reducing noise. According to Lahane, four key elements make up security observability, which includes knowing…

  1. The attack surface
  2. What comes in
  3. What goes out
  4. What is changed or mutated

Understanding this sort of runtime context, along with ingress events, can be critical to spotting bad actors or plugging cloud misconfigurations.

Best Practices to Enact Security Observability

Implementing the above pillars will require a few steps. First, says Lahane, is choosing the correct tooling that enables you to exchange context throughout the development pipeline, from development to CI/CD, to production — to ensure an important feedback loop.

For example, ThreatMapper, an open-source tool maintained by Deepfence, “hunts for vulnerabilities in your production platforms, and ranks these vulnerabilities based on their risk-of-exploit.” Such a tool could be used as part of a CI/CD process to scan container workloads or Kubernetes clusters and prioritize issues that pose the most significant risk.

As I’ve covered recently, DevSecOps is critical to a successful cybersecurity strategy. The practice aims to shift security left in the development cycle to prevent flaws early on. However, “shift left, secure right” is only possible if an organization can effectively exchange context, says Lahane.

Final Thoughts

Thousands of security hits don’t easily equate to actionable observability in a security context. Instead, engineers require fewer alerts (and more contextually aware alerts) to truly benefit their cybersecurity efforts. “You need fuller security observability throughout the lifecycle,” said Lahane.

Regarding the persons actually interfacing with security observability, Lahane sees a broad spectrum of IT participating. From developers to DevOps, to CloudOps, and DevSecOps, security observability should enable a continual feedback loop throughout a business. In that vein, open collaboration is critical to ensure organizations are not scrambling upon every zero-day exposure.

We know that software supply chain exploits present a major risk and will continue to rise. But what it comes down to, says Lahane, is that the industry is missing the measurability to determine if a platform is actually vulnerable or not. “The time is nigh for open platforms,” said Lahane. “I will not be surprised if we soon see a line item of security observability on every CISO’s budget.”


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cloud Cybersecurity DevOps devsecops security
Share. Facebook Twitter LinkedIn Email
Bill Doerrfeld
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

Related Posts

How One Company Added 20% to Profit with Cloud Optimization

June 27, 2025

The AI Economy: Oracle More Valuable than Disney, Goldman Sachs, and Uber Combined

June 26, 2025

Microsoft Delivers In-Depth View of Security, Governance Functions in Copilot Control System

June 26, 2025

The AI Economy: Oracle More Valuable than Disney + Uber + Goldman Sachs Combined!!!

June 26, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agent & Copilot Podcast: ServiceNow Innovation Officers Outline Agentic AI Opportunities in Healthcare
  • How One Company Added 20% to Profit with Cloud Optimization
  • Workday Sets the Standard for Responsible AI with Dual Governance Accreditations
  • The AI Economy: Oracle More Valuable than Disney, Goldman Sachs, and Uber Combined
  • Microsoft Delivers In-Depth View of Security, Governance Functions in Copilot Control System

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.