Cloud security management challenges customers. That is according to Gartner, claiming that most cloud security failures are the end-users’ fault, not the providers. Considering the volatile landscape of cloud-native applications, even the smallest mistakes can lead to serious cybersecurity breaches and data leaks.
Since more workloads move to the cloud, securing those cloud environments will get more complex. With that in mind, Gartner came up with several essential tools for the evolving market of cloud security and assessment solutions. In this article, we will focus on the two more dominant ones:
A year ago, when we planned our strategy and had our predictions for 2020, we most definitely could not predict how erratic 2020 would turn out to be. We too had to adjust and provide support for our employees’ and clients’ new needs. However, 2020 turned out to be a tipping point year for the Kubernetes community with a massive K8s adoption across the globe. Many companies made a huge shift to the cloud and in order to do it the most cost effective and efficient way they turned to Kubernetes. As a result we faced a growing need for Kubernetes Security and therefore 2020 has become the best year yet for Alcide.
Kubernetes, as an open-source system for managing and orchestrating containerized applications, is widely used among numerous organizations and enterprises, looking for a better mechanism for deployment and scaling of applications. AWS has repeatedly kept innovating while providing its devoted customers with numerous supported services in any environment, whether it is on the cloud or on-premise.
The dynamic, distributed, and ephemeral nature of multi-cluster Kubernetes deployments brings new challenges to security and compliance workflows and reporting.
Vulnerability Description and Impact
Alcide Logs and Coralogix
Last month, the Microsoft Azure Security Center published a fully detailed Threat Matrix for Kubernetes. This article identifies attack vectors unique to a Kubernetes environment. This important contribution is derived from the more generalized MITRE ATT&CK® framework that offers a complex matrix of common attack vectors.