Die Rolle von Kubernetes in der Cloud-Security
July 5, 2019
With the rapid adoption of Kubernetes for application and infrastructure orchestration, there’s a corresponding increase in the risk associated with data exposure and vulnerabilities throughout the application lifecycle. This whitepaper describes how to apply effective security so your organization has visibility, threat detection, and anomaly analysis to risks and threats for Kubernetes-deployed infrastructures, including publicly exposed and unsecured API servers and management consoles.
- Application visibility: Learn how to identify clusters, pods, nodes, and namespaces combined with application level communication between all of these at the application, process, and network layers
- Threat detection: See how detection of risks and threats affect Kubernetes through misconfigurations and threats that can affect your infrastructure by installing malicious code onto one of your containers
- Kubernetes forensics: Understand how to coordinate information among your containers, applications, and infrastructure so you can understand all Kubernetes activities, such as – pods, nodes, labels, namespaces, and all network information