Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

WAF is woefully insufficient in today’s container-based applications: Here’s why

By Amit Gupta
cloud-security-fp1170v390.jpg

Image via Freepik

December 2, 2022

According to the Cloud Security Alliance, the average large enterprise has 946 custom applications deployed. Traditionally, organizations deployed Web Application Firewalls (WAF), which provide visibility and enforce security controls on external traffic that passes through them, at the perimeter to protect these applications against external attacks.


However, WAF-secured container-based applications are likely to be breached, as the concept of a perimeter does not exist in these architectures. A new approach is needed to address both external threats and threats from lateral movement inside the cluster. In a world where successful exploits may be inevitable, relying on a perimeter WAF for application security leaves your entire environment vulnerable unless adequate security tools and policies are implemented at the workload level.

 

WAF’s Weak Security

Security techniques for traditional container-based application architectures are analogous to medieval castles, where everything important to running an application is consolidated within castle walls. In this analogy, WAF played the role of the wall and gate, only letting in friendly traffic. 


WAF provides additional capabilities in these traditional architectures. It actively parses through valid requests and threats and provides alerts when it receives suspicious log requests. These alerts keep the security team apprised of threats on the border. WAF also offers virtual patching capabilities to close off attack vectors for known vulnerabilities. Further, many companies must utilize WAF through various regulatory requirements, making it crucial for maintaining compliance in specific industries.


These capabilities, however, also feed into the downsides of WAF. For example, because WAF sits at the front gate, it requires complex rule-making that causes substantial false positives if implemented improperly. The effort required to tune alert configurations and rule sets to minimize those false positives significantly drains security team resources. WAF also does not prevent threats from malicious insiders, as these attacks circumvent the perimeter and enable easy access into the rest of the unprotected environment. Teams managing security using WAF can therefore be lulled into a false sense of security by assuming their whole architecture is secure just because of their perimeter.

 

Working Down Into Workloads

As mentioned, the perimeter-based approach to security is no longer efficient. And, when it comes to protecting cloud-native workloads, WAF as the sole security mechanism is not a viable approach.


Cloud-native environments present a challenge because there is no well-defined perimeter to secure. This architecture is built on containerized workloads that are highly ephemeral and communicate extensively with other containers and internet-connected resources outside the environment. These interconnections and elasticity make containerized applications more efficient — and make infiltrations and lateral movement far easier if proper security controls are not in place.


To avoid the shortcomings of WAF for cloud-native architectures, security teams must bring application-layer security down into the workloads themselves. Unlike traditional firewalls that rely on fixed network addresses, workload-based security controls apply security policies as code to ensure consistent, deep, and granular container-level protection across multi-cloud and hybrid environments.


These security controls are provided as declarative policies, ensuring that every workload has the same level of protection regardless of the environment. This approach enables granular visibility into what is happening across an architecture so that rapid mitigation can occur in the event of a compromised asset. 


Securing individual workloads also has the advantage of simplifying rule-making and reducing the security team’s burden. To return to our castle analogy, if you do everything at the gate, you’re forced to prepare for countless types of attacks — both known and unknown. However, establishing hardened checkpoints at every street corner will make any army’s advance significantly more difficult. This is the hallmark of a defense-in-depth (layered) strategy that has become a best practice for security practitioners.


Despite even the best efforts, it is always a best practice to assume bad actors will breach your environment at some point. Protecting cloud-native architectures, therefore, requires implementing a zero-trust architecture. In practice, this means allowing specific workloads to communicate with other resources only when and where necessary. Limiting this communication prevents bad actors from gaining a foothold and moving laterally through the environment to compromise additional assets. 

 

Is WAF a Waste?

The increasing complexity of container-based application architectures and attacks requires a new approach to security. Teams relying only on traditional WAF for cloud-native architectures will experience significant problems, but it still has a role. For example, WAF provides effective protection against Distributed Denial of Service (DDoS) attacks. That said, WAF is not dead — it’s just insufficient on its own.


By implementing a defense-in-depth approach to security, teams can utilize WAF where it excels, while complementing it where it needs support. Coupling this layered approach with zero-trust protocols creates a security apparatus that reduces false positives, minimizes the attack surface and increases efficiency across the board. This is the most sustainable solution that will future-proof the environment against known and unknown vulnerabilities to ensure business services remain online and secure. 


This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: cloud security cyber security risk management security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Amit Gupta is Chief Product Officer at Tigera.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

Security Officer

Discussing Use of Force in Security: A Challenging Discussion?

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • SEC1019-career-Feat-slide1_900px

    As Cyber Attacks Become More Prevalent, Here’s Why Your Small Business is at Risk

    See More
  • Fingerprint on Keyboard

    Why authentication is good medicine for today’s data breach epidemic

    See More
  • "Security:" What’s in a Word?

    Why Sensitivity Training is De Rigueur for Today’s Security Professionals

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products

Events

View AllSubmit An Event
  • January 6, 2011

    From Here to There - Advancing in the Security Field

    Learn the three components that are critical for your advancement.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing