Cloud Security

CNAPPs in 2025: What Cloud-Native Application Protection Platforms Actually Protect

CNAPP has become the dominant category in cloud security. But the label covers wildly different capabilities. A clear-eyed look at what CNAPPs do, where they fall short, and how supply chain security fits in.

Alex
Cloud Security Architect
7 min read

Cloud-Native Application Protection Platform. The acronym is CNAPP, coined by Gartner, and it has become the category that ate cloud security. Every vendor that previously sold cloud security posture management (CSPM), cloud workload protection (CWPP), container security, infrastructure-as-code scanning, or cloud identity management now positions themselves as a CNAPP.

This convergence makes sense in theory. Cloud security problems are interconnected. A misconfigured S3 bucket is more dangerous when it stores data from an application with a SQL injection vulnerability running in a container with an unpatched OS. Seeing these risks in isolation is less useful than seeing them together.

In practice, though, "CNAPP" has become so broad that it risks meaning nothing. Some CNAPPs are strong in posture management but weak in runtime protection. Others excel at container scanning but cannot analyze infrastructure-as-code. Understanding what a CNAPP actually covers -- and what it does not -- requires looking past the category label.

The CNAPP Component Stack

Cloud Security Posture Management (CSPM)

CSPM is the "are you configured correctly?" layer. It evaluates cloud resources against security best practices and compliance frameworks:

  • Are S3 buckets publicly accessible?
  • Are security groups overly permissive?
  • Is encryption enabled for data at rest and in transit?
  • Are IAM policies following least privilege?
  • Are logging and monitoring configured?

CSPM tools connect to cloud provider APIs (AWS, Azure, GCP) and evaluate resource configurations against rule sets. The rules map to frameworks like CIS Benchmarks, SOC 2, PCI DSS, and HIPAA.

CSPM is the most mature CNAPP component. The challenge is not detection -- most CSPM tools find the same misconfigurations -- but remediation. Organizations routinely have hundreds or thousands of CSPM findings, and prioritizing which ones to fix first requires context that basic CSPM does not provide.

Cloud Workload Protection (CWPP)

CWPP protects the compute layer: virtual machines, containers, and serverless functions. Capabilities include:

  • Vulnerability scanning: Identifying known CVEs in OS packages, application dependencies, and runtime environments within running workloads.
  • Runtime protection: Detecting anomalous behavior in running workloads, such as unexpected process execution, network connections, or file access.
  • File integrity monitoring: Detecting unauthorized changes to system files and configurations.
  • Network micro-segmentation: Controlling network communication between workloads based on security policies.

CWPP is where CNAPP overlaps with traditional endpoint security. The cloud-native distinction is that CWPP is designed for ephemeral, containerized workloads that traditional endpoint agents were not built for.

Cloud Infrastructure Entitlement Management (CIEM)

CIEM focuses on identity and access management in cloud environments. Cloud IAM is notoriously complex -- a single AWS account can have thousands of IAM policies, roles, and permission boundaries that interact in non-obvious ways.

CIEM tools analyze:

  • Effective permissions for each identity (user, role, service account).
  • Overprivileged identities that have more permissions than they use.
  • Cross-account access and privilege escalation paths.
  • Dormant identities that should be decommissioned.

CIEM is increasingly important as cloud breaches frequently involve IAM exploitation. An attacker who compromises an overprivileged service account can escalate far beyond the initial foothold.

Infrastructure-as-Code (IaC) Security

IaC scanning evaluates Terraform, CloudFormation, Pulumi, and other IaC templates for security issues before deployment. This is the "shift-left" component of CNAPP -- catching misconfigurations in code before they become runtime misconfigurations.

IaC scanning is valuable because it catches problems early (before resources are deployed) and integrates into developer workflows (CI/CD pipelines, IDE plugins). The limitation is that IaC scanning only sees what is declared in templates. Runtime drift -- where deployed resources diverge from their IaC definitions -- requires CSPM to detect.

Container and Kubernetes Security

Container-specific capabilities include:

  • Image scanning: Identifying vulnerabilities in container images before deployment.
  • Registry scanning: Continuously monitoring container registries for vulnerable images.
  • Admission control: Blocking deployment of images that do not meet security policies (unsigned, unscanned, or vulnerable beyond a threshold).
  • Kubernetes configuration assessment: Evaluating cluster configurations, RBAC policies, network policies, and pod security standards.
  • Runtime container protection: Monitoring container behavior for signs of compromise.

Where CNAPPs Fall Short on Supply Chain Security

Most CNAPPs treat supply chain security as a subset of vulnerability scanning. They scan container images and sometimes application dependencies for known CVEs. This is necessary but insufficient.

SBOM Lifecycle Management

CNAPPs typically generate vulnerability reports, not SBOMs. There is a meaningful difference. A vulnerability report is a point-in-time assessment of known issues. An SBOM is a persistent, machine-readable inventory of components that can be monitored continuously, shared with consumers, and used for impact analysis when new vulnerabilities are disclosed.

Few CNAPPs generate, store, version, and distribute SBOMs. Fewer still support VEX documents for communicating exploitability status. For organizations with SBOM compliance obligations, this gap means they need a separate tool.

Dependency Risk Beyond CVEs

CNAPPs focus on known vulnerabilities (CVEs). They do not assess broader dependency risks: maintainer health, project sustainability, license compliance, malicious package detection, or ownership changes. These are supply chain risks that fall outside the CNAPP scope.

Build Pipeline Security

CNAPPs protect deployed workloads and infrastructure. They generally do not secure the build pipeline that produces those workloads. CI/CD pipeline security, build provenance, artifact signing and verification, and SLSA compliance are supply chain security concerns that live before the CNAPP's field of view.

Software Composition in Depth

CNAPP vulnerability scanning identifies that a container image contains a vulnerable package. Specialized SCA tools go deeper: they map the vulnerability to specific functions, assess reachability from the application's entry points, and evaluate whether the vulnerability is exploitable in context. This depth of analysis is rarely available in CNAPP platforms.

CNAPP + Supply Chain Security: The Integrated View

The most effective cloud security posture combines CNAPP capabilities (posture management, workload protection, identity security) with dedicated supply chain security capabilities (SBOM lifecycle, deep SCA, build integrity, reachability analysis).

The integration points matter:

  • CNAPP container scanning identifies a vulnerable image in a registry. Supply chain SBOM data tells you which products and services use that image and what specific components are vulnerable.
  • CNAPP runtime protection detects anomalous behavior in a container. Supply chain provenance data verifies whether the running container matches the expected signed artifact.
  • CNAPP posture management finds a misconfigured resource. Supply chain dependency data shows whether that resource serves an application with its own vulnerability exposure, enabling combined risk assessment.

Evaluation Criteria

When evaluating CNAPPs, assess supply chain security capabilities explicitly:

  1. Does it generate SBOMs? Not just vulnerability reports, but actual CycloneDX or SPDX documents.
  2. Does it support reachability analysis? Or does it stop at version-level matching?
  3. Does it track dependency health beyond CVEs? Maintainer activity, license risk, malicious package detection?
  4. Does it integrate with build pipeline security? Provenance verification, artifact signing, admission policies?
  5. Does it support VEX? Can it consume and produce exploitability information?

If the CNAPP does not cover these areas, you need a complementary tool that does.

How Safeguard.sh Helps

Safeguard complements CNAPP platforms by providing the supply chain security depth that most CNAPPs lack. While your CNAPP handles cloud posture management, workload protection, and identity security, Safeguard handles the software supply chain lifecycle: SBOM generation and management, deep vulnerability analysis with reachability, EPSS-based prioritization, VEX generation, license compliance, and automated remediation through Griffin AI.

The platforms work together through shared integration points. Safeguard scans the same container images and application deployments that your CNAPP monitors, providing the deeper software composition analysis that turns a vulnerability count into actionable, prioritized remediation guidance. For organizations that have invested in CNAPP for cloud security, Safeguard fills the supply chain gap without requiring a platform replacement.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.