Hybrid cloud security isn’t just getting harder—it’s reaching a breaking point. While security has always been a race without a finish line, Red Hat’s 2026 State of Cloud-Native Security Report reveals that many organizations are now trapped in a cycle of controlled chaos. To break free, teams must move beyond reactive firefighting and anchor their strategy in the foundational security practices and policies that turn security from a bottleneck into a baseline.

Alt: Cover of The state of cloud-native security report

The reality of cloud-native incidents

The report establishes a sobering baseline: security incidents are now a near-universal experience. 97% of organizations reported at least 1 cloud-native security incident in the past year. These are not just sophisticated, one-off attacks; rather, they are often the result of "everyday lapses."

The most frequently reported incident types include:

  • Misconfigured infrastructure or services (78%): The leading cause of exposure, often due to manual errors in complex environments.
  • Known vulnerabilities: Workloads are being deployed with "known-bad" code, creating avoidable windows of risk.
  • Unauthorized access:  A persistent operational hurdle that frequently leads to sensitive data exposure.  

These incidents carry a tangible business cost that extends far beyond the IT department. 74% of organizations have delayed or slowed application deployments in the last 12 months due to security concerns. Beyond delays, 92% of respondents experienced significant impacts ranging from increased time spent on remediation (52%) and reduced developer productivity (43%) to the loss of customer trust (32%). In short, security is no longer just a technical checkbox—it’s a primary risk to business agility.

Alt: Regulatory alignment responses from surveyed organizations, ISO/IEC27000-series being 88%.

Caption: The response when the surveyed organizations were asked “To what extent do you expect each of the following to impact your organization’s cloud-native security strategy over the next 12 months? (reporting some or strong influence).

The maturity paradox: Confidence vs. strategy

One of the report’s most striking findings is the gap between perceived readiness and actual strategy. While 56% of organizations describe their day-to-day security posture as "highly proactive." However, only 39% actually possess a mature, well-defined cloud-native security strategy.

This suggests that while teams aspire to be forward-looking, many are "improvising." In fact, approximately 22% of organizations operate with no defined strategy at all. This lack of structure leads to inconsistent adoption of security guardrails, including:

  • Identity and Access Management (IAM): Roughly 75% adoption, as identity is widely recognized as a core control.
  • Container image signing: Only about half of organizations have implemented this capability for software integrity.
  • Runtime protection: Implementation remains patchy, leaving many teams to rely on default settings rather than intentional governance.

The data underscores that maturity pays off: organizations with a well-defined strategy are far more likely to adopt advanced guardrails and report 61% confidence in securing their software supply chain, compared to much lower confidence among less mature peers.

Shifting investment trends: Automation and the supply chain

Recognizing these gaps, organizations are rebalancing their budgets for 2026. The focus is shifting from disparate point tools toward platform consolidation and building security directly into the software lifecycle.

Key investment priorities for the next 1–2 years include:

  • DevSecOps automation: Over 60% of organizations plan to invest in automating security within CI/CD pipelines. The goal is to move from manual "gates" to "security as code" to reduce human error.
  • Software supply chain security: 56% of organizations are prioritizing this area. With supply chain attacks soaring, there is an urgent need to verify open source dependencies and container images through Software Bills of Materials (SBOMs) and provenance checks.
  • Runtime protection: 54% of respondents intend to expand defenses that can detect and block active threats, such as cryptojacking or rogue container behavior, in real time.

Compliance is no longer a back-burner issue. 64% of organizations expect the EU Cyber Resilience Act (CRA) to be a primary driver of their 2026 investment decisions. This shifts security governance from a "nice-to-have" to a mandatory, board-level requirement.

The emerging risk frontier: AI and cloud security

In 2026, AI has become a double-edged sword for cloud-native teams. While 58% of organizations say AI adoption is now a core driver of their security planning, actual governance is lagging "dangerously behind" the pace of implementation.

The report reveals a near-universal anxiety regarding generative AI (gen AI) in cloud environments, with 96% of respondents expressing significant concerns. These fears aren't just theoretical; they are centered on three specific risks:

  • Ubiquitous concern: 96% of respondents have worries about gen AI in their cloud environments.
  • Top fears: These include exposure of sensitive data, shadow AI tools used without approval, and the integration of insecure third-party AI services.
  • The governance gap: Despite these fears, 59% of organizations lack documented internal AI usage policies or governance frameworks.
     

    Alt: Page from the report detailing information from respondents about AI

Without clear rules, organizations risk AI-powered behaviors altering configurations or leaking proprietary code outside of normal processes, essentially amplifying existing identity and supply chain risks.

Data-based recommendations for 2026

The report concludes with a clear directive: the speed of cloud-native innovation has officially outpaced traditional security. To bridge the maturity paradox, organizations must move beyond ad-hoc firefighting and adopt a structured, platform-centric approach.

5 critical actions for 2026

  1. Establish a formal strategy: Organizations must move beyond "ad-hoc firefighting" by creating a structured path from a reactive to a proactive posture.
     
  2. Embed guardrails and automation: Security must be a secure-by-default part of the platform, executed by DevOps or platform engineering teams to scale without adding friction for developers.
     
  3. Prioritize supply chain integrity: Implement mandatory image signing and dependency scanning. As one respondent noted, while everyone uses open source, "hardly anyone scans or signs their dependencies." Being the exception is critical for resilience.
     
  4. Close the feedback loop: Unify observability and security data so that insights from runtime threat detection are fed back into the development process to prioritize the most critical fixes.
     
  5. Govern AI usage now: Organizations can’t wait for external regulations. They must convene cross-functional teams to develop guidelines on acceptable AI use and data handling immediately.

In 2026, security is no longer a bolted-on extra—it’s a foundational component of cloud-native architecture. The organizations that succeed will be those that treat security as a primary driver of business agility, rather than a cost center.

Read the full report to learn more.

리소스

적응형 엔터프라이즈: AI 준비성은 곧 위기 대응력

Red Hat의 COO 겸 CSO인 Michael Ferris가 쓴 이 e-Book은 오늘날 IT 리더들이 직면한 AI의 변화와 기술적 위기의 속도를 살펴봅니다.

저자 소개

Red Hatter since 2018, technology historian and founder of The Museum of Art and Digital Entertainment. Two decades of journalism mixed with technology expertise, storytelling and oodles of computing experience from inception to ewaste recycling. I have taught or had my work used in classes at USF, SFSU, AAU, UC Law Hastings and Harvard Law. 

I have worked with the EFF, Stanford, MIT, and Archive.org to brief the US Copyright Office and change US copyright law. We won multiple exemptions to the DMCA, accepted and implemented by the Librarian of Congress. My writings have appeared in Wired, Bloomberg, Make Magazine, SD Times, The Austin American Statesman, The Atlanta Journal Constitution and many other outlets.

I have been written about by the Wall Street Journal, The Washington Post, Wired and The Atlantic. I have been called "The Gertrude Stein of Video Games," an honor I accept, as I live less than a mile from her childhood home in Oakland, CA. I was project lead on the first successful institutional preservation and rebooting of the first massively multiplayer game, Habitat, for the C64, from 1986: https://neohabitat.org . I've consulted and collaborated with the NY MOMA, the Oakland Museum of California, Cisco, Semtech, Twilio, Game Developers Conference, NGNX, the Anti-Defamation League, the Library of Congress and the Oakland Public Library System on projects, contracts, and exhibitions.

 
UI_Icon-Red_Hat-Close-A-Black-RGB

채널별 검색

automation icon

오토메이션

기술, 팀, 인프라를 위한 IT 자동화 최신 동향

AI icon

인공지능

고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트

open hybrid cloud icon

오픈 하이브리드 클라우드

하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요

security icon

보안

환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보

edge icon

엣지 컴퓨팅

엣지에서의 운영을 단순화하는 플랫폼 업데이트

Infrastructure icon

인프라

세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보

application development icon

애플리케이션

복잡한 애플리케이션에 대한 솔루션 더 보기

Virtualization icon

가상화

온프레미스와 클라우드 환경에서 워크로드를 유연하게 운영하기 위한 엔터프라이즈 가상화의 미래