Back to the Future: Next-Generation Cloud Native Security - A talk by Andrew Martin & Matt Jarvis

Back to the Future: Next-Generation Cloud Native Security
Keeping a close eye on technological evolution is essential for anticipating its impact on the future. In a recent talk, Matt Jarvis, Director of Developer Relations at Snyk, and Andrew Martin, CEO of ControlPlane, explored the history of cloud-native computing, examined the current security landscape, and shared their predictions for the decade ahead.
In this blog post, we delve into their discussion, unpacking the evolution of cloud-native security and outlining the key steps organisations must take to prepare for tomorrow’s challenges.
A Glimpse into the Past: Building Private Clouds Without Kubernetes
In the early 2010s, cloud technology looked vastly different from today. Matt and Andrew recounted how they both worked on building and operating on-premises private clouds. Back then, OpenStack was the go-to solution for deploying cloud infrastructure. The ecosystem lacked container technologies like Kubernetes and Docker, forcing developers to rely heavily on manual security processes and brittle Bash scripts.
Security practices were primitive compared to today’s standards. Nessus and Nagios were the primary scanning and vulnerability check tools, but they required more manual effort and lacked sophisticated automation.
As Matt emphasised, “The cycle of technology change moves pretty fast, and it’s only getting faster.” Over the last decade, cloud technology has evolved dramatically, and looking forward, the next 10 years will likely bring even more significant changes.
The Birth of Cloud Native: From Mainframes to Micro VMs
The evolution from mainframes and co-located servers to the emergence of cloud native technologies was a game-changer for the industry. Google’s Borg container manager and the rise of Linux Containers (LXC) laid the groundwork for modern containerisation technologies like Docker and Kubernetes. These technologies allowed developers to split resources and scale applications in ways that were previously unimaginable.
The next evolution came with micro VMs and hybrid runtimes like Kata Containers and Firecracker, combining virtual machines’ security with containers’ lightweight footprint. These advancements drastically improved scalability, elasticity, and resilience.
Yet, despite all these improvements, security remains a critical challenge. Managing distributed systems requires a new approach to safeguarding both data and infrastructure.
Emerging Trends in Cloud Native Security
As we look ahead, several key technologies are poised to reshape the future of cloud native security:
WebAssembly (WASM)
Initially developed for browser environments, WebAssembly is gaining traction on the server side. Docker and container runtimes, like containerd, have already integrated WASM support. Although it’s unlikely to replace containers in the short term, it offers an exciting alternative for lightweight, secure code execution.
Reproducible Builds and Supply Chain Security
One of the biggest concerns in cloud native environments is ensuring that builds are deterministic. That means producing the same binary artefact every time a build is run, which reduces the risk of introducing security vulnerabilities. The concept of bootstrappable builds is gaining momentum, ensuring that code is reproducible and that the entire build pipeline can be verified from the ground up.
Open Source Silicon
In the hardware space, open source silicon projects like OpenTitan are paving the way for more verifiable and auditable hardware security. These projects aim to create open source designs for processors and chips, enabling deeper trust in the systems that form the foundation of our cloud infrastructure.
AI and Quantum Computing in Security
The most disruptive trend on the horizon is the integration of AI and Quantum Computing into security. Large language models like ChatGPT are already transforming how code is written and tested. AI could soon automate tasks such as vulnerability scanning and even attack simulation, greatly enhancing defensive capabilities.
On the quantum front, the looming threat of Q-Day, when quantum computers may break existing encryption algorithms, has prompted the development of post-quantum cryptography. This shift will likely become essential as quantum computing matures in the coming decade.
Securing the Future: Where Do We Go From Here?
The security challenges of the future are daunting. Matt and Andrew pointed out that “Trust” will be the central pillar of all emerging security technologies. Whether it’s trusting the hardware, the AI models we use, or the build systems that compile our software, trust will be the foundation on which future cloud native security is built.
At the same time, security practices need to evolve to match the increasing complexity of cloud native environments. Tools like eBPF are already transforming how we monitor and secure Linux-based systems. At the same time, Rust, a programming language focused on memory safety, is finding its way into the Linux kernel.
As companies continue to adopt these new technologies, we must rethink how we educate and train developers and security practitioners. The next generation of professionals must be well-versed in everything from AI-driven development to quantum-resilient cryptography.
Final Thoughts: Preparing for the Next Decade
Cloud native technologies have come a long way, and we’ve only scratched the surface of what’s possible. The next 10 years will bring even more profound changes as AI, quantum computing, and open-source silicon gain traction.
However, with every innovation come new challenges. To stay ahead of emerging threats, organisations must adopt a proactive approach to security—one that incorporates the latest tools, practices, and mindsets.
As Dr. Emmett Brown famously said, “Your future is whatever you make it, so make it a good one.” By embracing change and building trust, we can navigate the complex security landscape ahead and ensure that our cloud native systems remain resilient.
To watch Matt and Andrew’s full talk, click this link.