What is a Cloud Workload Protection Platform (CWPP)?

Wiz Experts Team
7 minute read
Cloud workload protection platform takeaways:
  • Cloud workload protection platforms (CWPP) provide continuous threat monitoring across different cloud environments, protecting workloads running on virtualized private servers, public cloud infrastructure, on-premises data centers, and serverless platforms like AWS Lambda. 

  • CWPPs combine machine learning, behavioral analysis, and automated defenses to ensure cloud workloads are secure no matter where they run, examining tiny patterns and variations to understand what's normal for the system and spot potential threats. 

  • Runtime protection is the core of CWPPs, providing real-time protection that detects and neutralizes threats attempting to infiltrate cloud workloads. 

  • CWPPs give enhanced visibility of cloud-based applications, enabling security teams to scrutinize activities, identify abnormalities, and take preemptive actions against threats with surgical precision. 

What is a cloud workload protection platform?

A cloud workload protection platform (CWPP) is a security solution that provides continuous threat monitoring and protection for cloud workloads across different types of cloud environments. 

A CWPP protects cloud workloads running on virtualized private servers and public cloud infrastructure, on-premises data centers, and serverless workload platforms like AWS Lambda.

Cloud workload security, also known as cloud workload protection, is a set of security controls aimed at protecting cloud-based workloads.

It’s this comprehensive protection that makes a CWPP a cut above other cybersecurity solutions. 

As Gartner once said, “CWPPs protect server workloads from attack, regardless of the location or granularity of the workload.”

What is a cloud workload? 

A cloud workload is a collection of resources that are used to execute a specific business process or function. These resources can include virtual machines, containers, databases, applications, and data. Cloud workloads can be deployed on a variety of cloud platforms, including public, private clouds, and hybrid cloud environments.

How does a CWPP work?

A CWPP should have complete workload visibility, not just of the workloads themselves, but also their interconnections across the environment

CWPPs combine machine learning, behavioral analysis, and automated defenses, all working together to ensure your cloud workloads are secure no matter where they run. It carefully examines tiny patterns and variations, trying to understand what's normal for your system. With this understanding, it can spot anything unusual that may be a threat. It can instantly raise a red flag and activate response playbooks to stop a potential security threat before it causes any real damage.

A CWPP's first step is scanning workloads for any security vulnerabilities. It then suggests remedial action to deal with these vulnerabilities. Finally, once known threats are neutralized, your CWPP also keeps an eye out for threats that may arise in production or during runtime.

From an operational point of view, a CWPP makes life easy for cybersecurity professionals. It gives them a single centralized vantage point from which to view their entire technology estate—whether cloud, hybrid, or on-premises. Rather than switching context between multiple security tools, cybersecurity professionals gain added focus on the key issues that need to be addressed across the entire landscape of their software systems.

Pro tip

The Wiz Research team has found that 58% of cloud environments have at least one publicly exposed workload with a cleartext long-term cloud key stored in it. This greatly increases the risk of lateral movement in the VPC and between VPCs.

Learn more

CWPP benefits

Let’s explore the key benefits through which a CWPP empowers organizations to fend off potential vulnerabilities across your technology stack end to end:

  • Ruthless visibility: CWPPs give you enhanced visibility of cloud-based applications so your security teams get to scrutinize activities, identify abnormalities, and take preemptive actions against threats with surgical precision. This enables you to stay on top of potential security risks in real time and proactively safeguard sensitive data and critical applications.

  • Proactive threat detection: A CWPP’s real-time threat detection recognizes and analyzes emerging threats and ensures security breaches are nipped in the bud. It gives you the edge to respond to incidents as soon as they occur, reducing the potential damage the incident can cause.

  • Policy enforcement: CWPPs seamlessly integrate security policies throughout your cloud infrastructure and ensure compliance with regulatory mandates and internal security protocols.

  • Compliance auditing and reporting: A CWPP ensures adherence to stringent regulatory frameworks, safeguards sensitive data, and strengthens the sanctity of critical operations. While this can reduce the risk of noncompliance, your team should implement organization policies and best practices to combat limitations from human error, new threats, and shared responsibility challenges.

Key features to look for in a CWPP

With the number of cybersecurity solutions available, you need a handy list of essential features to look for in a capable CWPP solution. You'll have to carefully scrutinize each option and consider compatibility and scalability before making your pick. 

Here are the top must-haves for your CWPP platform:

Runtime protection: The heart and soul of your CWPP lies in its ability to provide unwavering real-time protection. This means that threats attempting to infiltrate your cloud workloads are swiftly detected and neutralized without delay. With runtime protection in your CWPP toolkit, your potential damage is mitigated, and your operations continue smoothly without disruptions.

Wiz Runtime Sensor detects in real-time

Real-time threat detection and incident response: A CWPP can detect known and unknown threats and suspicious activity across your cloud environments, including remote code execution, malware, crypto-mining, lateral movement, privilege escalation, container escape, and more.

Get real-time alerts to harden your security posture against a variety of malware

Agentless scanning: If your CWPP solutions support this, you can say goodbye to the hassle of agent deployment and enjoy the benefits of agentless scanning across your entire cloud stack. Agentless scanning simplifies cloud security management, as it’s easier to get started with. Plus, it's resource-friendly, making sure your cloud environment remains optimized at scale.

An agentless solution should offer full coverage across PaaS resources, virtual machines, containers, serverless functions, or sensitive data stored

Vulnerability management: A CWPP's vulnerability assessment should prioritize vulnerabilities based on their severity, exploitability, and the value of the assets they affect. This helps organizations focus on the vulnerabilities that pose the greatest risk.

A Wiz Vulnerability Catalog

CI/CD integration: For fortified cloud security at every stage of your software development life cycle (SDLC), seamless integration of your CWPP into the continuous integration and continuous deployment (CI/CD) pipeline is a must. By weaving security measures into every step of your developmental process, you create applications that stand strong against potential vulnerabilities.

Pre-built integrations allow security teams to create automated workflows to quickly route issues to the right teams for remediation

Compliance assessments: A complete CWPP solution should also continuously assess your workloads across all compliance frameworks. The results should be organized into a compliance heatmap to allow security teams to quickly determine areas of focus.

Example of a compliance heatmap

CWPP vs. CSPM

In general, CWPPs and CSPMs are complementary tools that can be used together to provide a comprehensive approach to cloud security. CWPPs can help protect cloud workloads from attacks, while CSPMs can help prevent misconfigurations that can make cloud workloads more vulnerable to attack.

Example use cases for CWPPs

The Wiz research team discovered a fileless attack named PyLoose, which targets cloud workloads using a Python script that leverages the Linux fileless technique memfd. Fileless attacks, like PyLoose, are particularly elusive due to their reliance on memory-based execution and the Linux memfd feature, making them harder to detect, investigate, and attribute.

Fortunately, the Wiz runtime sensor was able to detect malicious behavior, such as payload delivery and execution, unfolding inside the workload. Below is an example detection from the CWPP:

Runtime Sensor alert for fileless execution (including PyLoose)

Check out the research team's blog below to get a step-by-step analysis of how the Pyloose attack unfolded and how it was detected.

Restricting overprivileged access with CWPP insights

Imagine you see service A accessing another high-priority service B, which it doesn’t usually access. You wonder if something is amiss. Your CWPP can give you insight into each service, its permissions, and how you can secure them. 

You use your CWPP solution to dig in and find that service A has read and write access to service B, and it requires read-only access. You have all the information you need to reduce the privileges of service A and give it a dynamic secret with read-only access to service B the next time. CWPPs give you this crucial context and enable you to put the proper access controls in place.

Revealing cloud misconfiguration and detecting drift

The effective management of host configurations in today's intricate and sprawling application infrastructures is a complex challenge that can lead to vulnerabilities and misconfigurations. CWPPs help tackle this challenge with custom host configuration rules.

Custom host config rules are like a magnifying glass for the black boxes that are often virtual machines. These rules identify misconfigurations and allow you to zoom in on the configuration without having to scope into a specific resource.

Example of a custom rule editor that allows for a variety of criteria to be included, from file content testing to permission tests

Custom host config rules empower users to create tailored logic that is executed during automated, agentless workload scans. In turn, manual commands on virtual machines or application files are no longer required, ensuring comprehensive coverage across the entire cloud estate.

Custom rules can also be automatically applied to any new workload to determine if the OS or cloud application is misconfigured. So if configuration changes over time due to user intervention or malicious intent, a CWPP will audit the changes and alert you to configuration drift.

Which products provide a cloud workload protection platform?

Below are platforms and solutions you can consider for protection:

PlatformProsReviews
Wiz
  • Unified solution for improved security as a CNAPP 
  • Agentless scanning
  • Contextual risk graph with prioritized recommendations
  • Robust runtime security
Could require a cultural training mindset for a DevSecOps, shift left approach that embeds security throughout development, deployment, and management.
Palo Alto Prisma Cloud
  • Effective runtime protection, IAM, threat detection, and prevention
  • Monitor your assets across all cloud environments
  • Some users express frustration with poor documentation and a confusing interface.
  • Others complain about slow resolution times for support tickets.
Microsoft Defender for Cloud
  • Natively works within the Azure system with effective threat detection
  • Uses machine learning to combat the latest vulnerabilities and threats
  • Some users feel the platform can be too complex.
  • Other users feel there are moments of delayed detections.
CrowdStrike Falcon Cloud Workload Protection
  • Efficient runtime capabilities
  • Solid EDR heritage
  • Some users say the native automations could be challenging.
  • Several users feel there needs to be more improvements, like one user stating “limitations in the API have created challenges.”

Sources: Gartner (1),(2) and G2 review

While many tools in the market offer valuable cloud workload protection, your cloud security doesn’t stop there. That’s why it’s important to adopt a CNAPP like Wiz that offers what you need in a CWPP and all the tools you need within your cloud environment. 

With Wiz, the full cloud-native solution, you get everything required for strong cloud security in one place. What would that look like for you? Find out below.

Wiz: A CWPP is just one part of the equation

When you consolidate your tools into a unified security platform and strategy, you get better, more organized security. 

That’s what Adam Fletcher, Chief Security Officer of Blackstone, experienced firsthand when Blackstone chose Wiz for unified cloud security. He said:

“We appreciated that Wiz's product was able to consolidate five key capabilities that we felt were important to securing our cloud environment using a single platform. They made it so that one resource could operate that environment and then connect it and empower the owners of our cloud workloads to remediate issues quickly with minimal involvement from our team.”

Because Wiz consolidated CSPM, CWPP, and other capabilities, Blackstone leveraged the features to combat deep cloud-native risks throughout its systems. The agentless scanning found issues across the stack and offered real-time, prioritized recommendations. By using Wiz for CWPP and cloud security needs, Blackstone could conduct the best security in the market for its team, customers, and stakeholders.

Wiz’s holistic cloud security strategy involves a combination of cloud solutions, including:

  • A CWPP to protect workloads end-to-end

  • Cloud infrastructure entitlement management (CIEM) to manage permissions at scale

  • Cloud security posture management (CSPM) for secure management of configuration and resources

Together, this combination of solutions is referred to as a cloud-native application protection platform (CNAPP). Embracing a modern CNAPP solution can help you keep pace with the fast-changing cloud landscape and the complexity of a fragmented technology ecosystem.

To see for yourself how a CNAPP solution consolidates the benefits of point products into one platform, schedule a demo with our Wiz product experts.

CWPP FAQs