Home United States USA — software Kubernetes attacks are growing: Why real-time threat detection is the answer for...

Kubernetes attacks are growing: Why real-time threat detection is the answer for enterprises

86
0
SHARE

Over the last year, 89% of enterprises experienced at least one container or Kubernetes security incident, making security a high priority.
Over the last year 89% of organizations experienced at least one container or Kubernetes security incident, making security a high priority for DevOps and security teams.
Despite many DevOps teams’ opinions of Kubernetes not being secure, it commands 92% of the container market. Gartner predicts that 95% of enterprises will be running containerized applications in production by 2029, a significant jump from less than 50% last year.
While misconfigurations are responsible for 40% of incidents and 26% reported their organizations failed audits, the underlying weaknesses of Kubernetes security haven’t yet been fully addressed. One of the most urgent issues is deciphering the massive number of alerts produced and finding the ones that reflect a credible threat.Kubernetes attacks are growing
Attackers are finding Kubernetes environments to be an easy target due to the growing number of misconfigurations and vulnerabilities enterprises using them are not resolving quickly – if at all. Red Hat’s latest state of Kubernetes security report found that 45% of DevOps teams are experiencing security incidents during the runtime phase, where attackers exploit live vulnerabilities .
The Cloud Native Computing Foundations’ Kubernetes report found that 28% of organizations have over 90% of workloads running in insecure Kubernetes configurations. More than 71% of workloads are running with root access, increasing the probability of system compromises.
Traditional approaches to defending against attacks are failing to keep up. Attackers know they can move faster than organizations once a misconfiguration, vulnerability or exposed service is discovered. Known for taking minutes from initial intrusion to taking control of a container, attackers exploit weaknesses and gaps in Kubernetes security in minutes. Traditional security tools and platforms can take days to detect, remediate and close critical gaps.
As attackers sharpen their tradecraft and arsenal of tools, organizations need more real-time data to stand a chance against Kubernetes attacks.Why alert-based systems aren’t enough
Nearly all organizations that have standardized Kubernetes as part of their DevOps process rely on alert-based systems as their first line of defense against container attacks. Aqua Security, Twistlock (now part of Palo Alto Networks), Sysdig, and StackRox (Red Hat) offer Kubernetes solutions that provide threat detection, visibility and vulnerability scanning.

Continue reading...