When we talk about cloud-native security, it is easy to overlook the often unseen and damaging effects of application vulnerabilities running through federal network environments in spite of