Kubernetes use is rising rapidly: 58% more respondents than last year - 78% of this years’ respondents - reported in the 2019 CNCF (Cloud Native Computing Foundation) survey that they use Kubernetes today. With numbers like those, it looks like everyone is headed towards the cloud.
Vulnerability Description and Impact
Last month, the Microsoft Azure Security Center published a fully detailed Threat Matrix for Kubernetes. This article identifies attack vectors unique to a Kubernetes environment. This important contribution is derived from the more generalized MITRE ATT&CK® framework that offers a complex matrix of common attack vectors.
Last week we released sKan: a new CI scanner for DevOps and developers that scans K8s deployment files for security drifts.
When it comes to personal data, an individual's health records are right up there as being amongst the most sensitive of data. Protecting it from being accidentally or purposely leaked or misused, is of the highest importance; both from an individual's perspective, but also from a governmental perspective.
I'm a fan of online surveys. It's a fun, simple, and a great way to check the pulse of our community.
We launched our first survey back in 2018, where we looked at the state of securing cloud workloads. We then continued the motion in 2019 with The Kubernetes Adoption and Usage survey and most recently with the Helm survey, still open for feedback.
In this blog post I'd like to focus on the 2019 Alcide Kubernetes survey. Based on 200 responses from Dev, Ops, Security and Cloud Architects, our survey reveals that 45% of companies are now running Kubernetes in production, while 37% are leveraging hybrid or multi-cloud environments for their Kubernetes clusters.
The Kubernetes container-orchestration system provides a platform for automating deployments
and operations of application containers across clusters of hosts by defining resources as
manageable Objects. Some of these resources can be managed by other resources automatically
while others can be referenced through metadata fields within the object.